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", 0x1000}, {&(0x7f0000001740)="48b62be61f2daaa3cfa91d35fff06c4ee1e3ca980ac7ff80e3f9d8e03701953041bc090df830a9d600f3876b4fcf0844a3d017f5177b76ee9801818a0f893ad3995c5fe8a28d004ed20ac6d3dc019dbe9b262e17539c3f78362b7753124ee1c2f007023a7e3c377fbe52d98898800573ce642ab4c1a973f6a305682e27da80a79114aa4d2d8d4d9d8abe82e33a56bd6a6ee52a08235491d8f0055a6753045affb1b1b67b86b957", 0xa7}], 0xa, &(0x7f00000018c0)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x1018, 0x117, 0x2, 0x1000, "1b8dde136436b8d420faa6684de1f4395c07cb3cd8005aded5204682fef0ddbf4ed00fdcb22a7fd95a262073c7313070b2670d5d78238c8e5ff0a0151338179d1e5997a20dcea4363ff0dbf38e0a05ec19e809d44c2d39e367a228b0c16918ec9421b5d8f376ab5988ff87f355142a319f5802b356d298e8914079f41a533380a23c4f21935e7aa4f130f212455ba0c2964fe2e95942014c9935245e1081453ab7387bd5567dd05c1ba2ce5826c16c70455a3db3dfd0a5682bc9f4a007692339f7692aca9aa0432ee0e726ffe74558b238f56fa8fcee21c532cd7dfd555c2112cae670e066ad46a2df514c690abb73f9a21b60048f3e4402a4f85f5c7247875e58824635590cbeddee3c7a48a3db1dcab043f134372a82aa41cbde3095c7bbb91751ce5abd2091efc9f77289e7d8833b556e012421422b6f6cae14e7ae38f8f6fa18121b421aeddf9a0f64cb76929c56c385b63dafcd4c1ec748ac513ce0db7639bb3c60d8b91e0ac0a1a4e0cb5f90add3fb9aa3197e9c31a982e565438e0d1ddb93e08a1ed26d9f695bb0539980f2f7cead1df7363984f5fc2200552dbf99d6cd5cca0c009ab854f4e2ec4f4530aeefde86e1990a566e3dabfc8698f130896cf02854169416d13b986c86feaeff9acc10f85db236e96f4b7284b73df5ffc1cfa0d0f6f1330c785b98cc2adde6f8ea22619cf137b342aee4607b777a805e58b371d946d758a28c25c494006197f183bedd17d520bef28dc351bca1a5fc658591c154485a625f050351d3df897ec3540956a20f503ef8774e5a38dc9d920b2c151445745b8c7447866f1d60cb6335f14ff4b1d1a4a0bfcb3d15425ba425b9e8b7e3a1981a7368a26d196db0fa333119387e04f814603297f32a0723a2d0a91edf7ee2d74ccd9857f657c9f5ac9673ffbf85e9f158aeab61cd8f0971c38cb01d105165502ac5da70c3e5d8158e6033acb3bfd63116393a7d1ff61d92adb95d1d4311945fd410b5aff73c32f0dbad1b6129c4f2dbabe82cff627b1160a051e2803d085f19f010b18e617c6596fc9995c1571f83ba4f3335581191bd2a3b5e2b33a15adc7147b5839fc9862ed39e3cedce9d0eaf8c25a8fe0ab8eeb93507cbba2b7a2808e26fc001206eab77bc89ea5517bd8631fc4548842537d1cfd135e6a0d51eefc78276fd859a569fa7a2e7580604cf31744a039ad077eb7ece7ad213ea934ad23be72ab15e9cba7a8f8bff7f438499fad5d5d045f612e438f79e45c1efea31894c5fb635f12261eb9d910a7b54e5744d7f07f88ff908c3a56cb1a4e58e69fad7970534729b8bfcdcf4d5e7562907e09608a3fff812f8380b922a516e3ba9e56efb3609cf57453ec19bfd5e0c4a0af03eab377953ade758792197336aba393dbda57dfa7e56cb68be2b65fa2044da4eeb2656502a94a68a837cbac4bc326c8fb4e98fbbe9eb894cf37d0d6f6b0d1b11273c767c9d24c14ac60dc7c4cfc559bec663c5203c7a39a32574b7e40665873b7285bb1859304d93f362b4b189ab24b88e7c233051c0e0be04fbacb82ed0c236bbe0ff36b9ac69fbd217212245b0b976a8784ca2a527f53c807f3012c496a97162a75ba51c3e22ed771b34886405d446ed432f382f4af964b718801c0816f841d3999d9eaeac3f7d99c73a2316a869fab9c1db936dd67f77e1053814d9d7de5eaba83ba5f33ed9a03f3798fba13fe0eb812e2316689a7f11a6bb8c5d83887428ea6610973b664b6f45e43ecd082b2988d215f70511aaa33e226fce2ea76a79be27affd2ba6df235b712feff2ab3e542cb43b501c2a9a588c63990b1af768e62b65e5ffc9f5660b8069862bc7cd88502ca6871086324c1bfd7cb6e975df30ef1db1a20ead4c3cddb4b5861508c687a2909a8c76cccae791c9f88a5f4e474a03433b48cc5665a9d2717b2e360be361711d132d27b5ba5876f02aa5b55e0f134ec825349ef4a0b0dfe3f5b686fbcdef11d17a44171ba73dadcd6433a51edd7cc25b77ea8877bc5582ca33894e66bcde35e80956109b234903df243baf93291a779b6f04c57563e5c2fe465cd84bfe6d21b09992d3ec0390f8532fca37183e25d8dbc057ff680c7a7eb80944014e4c6ebafe75491c45895ec7360dd6efb921ee9f7707da0e87fe1a6e49abd313b3bd106451562ce470c731db00504717451bb21feb34573b492f22d2641e8deb7a56a04e54269ceece213aa5cc1b66e53811d7798ed7de00633419a5951f14ea542f186eacc22f9c8d0418a49bdf1b81364ca0d58db6f1dca06070721545b34e1c81b4d9b72dcb03b542eef6c5ef899ea218ff72995989a9c5d97ba23cfdf26a842469d2142beb54da6fda540558ac9a8d61542b8457355d704bf4d0a13019e52eca023450d89a1ada389c1386c6e0417c367f15f0c8098cc9478c44d5f7465ef543e3911f13bba76b9c5821427d766e9de2a7df8457f438ef2b257d706f64529b1d136bc61fef902eb305de36d189610a6444af8e9812e7cbf2c9db61fe47fa05618be85938e26d7c5e7d91504fe4e7ec8b9b6f10fa91d1d8afa0d11b37e942b884fc9ea11a576ea3e3af347820abea6e02cac938bb36332a356caaeab15934ed633b604ca4cfe3120ed858c704ed4391bea9d7955bc05a436c287416cbcf0e2c74a1cc8ac9070e073bb9fdd5ae50cd458467e03f9c2c94f91c4e6e5f4c1a516b2b692c19206a10db11f5781ef3e76749b5138784b63999a1174c8e0a8b6eb5601403e4c610cd012758ddbec92b8f672d79ce457099a4f17f830a0e8fb5fdeb25dda89c291df0be4621bd7c6f7baca46e0991abb754b1b0481c7c3c16f803713b8df37959c86f0fe02cd9f3e2a314832f17e06ee3b1a8674d8336d012bf20f01de8992cb9e4a8ae0b14f5a8009daddb2420d826575efe58d161207bd7ac282fe65aad4b08a3cd7ed468a8f301e56f0281de5dd85ef919c07a1e62683ebd21f937dcbdc83e82d77cbc89fda2b8c1a01356db03b36826b356e12c7d21039b17a100a223fa2dc23f3121744828c55ee31429df948d00e204503e2a0e1d1c639acb24e6d2bb06db8bfbb534c21b8ac632526343a4f703f721ce44f4b78a9833de3b976224bf4ab353c69dbabbe86e260da40201e9919bb8ed6e6298cbf2047c79ace8e15385733c9d5a346e7ad0fd18539f04245041f6b3c6b598c2c3fa7a61e531c8d7dba6d7a2a88c1f22718295c39390d290b877d08f25e05ad5fd7a23fc89424d314c31467ecb82a0ea97bd97f2009d279dfe8af5c27172f59759cb9f46fba31f07b1f839120569f52a8363f94d1ac5118e3931a3fcdcbcaafae6186265370a1f944923f74d89477380fd983ac71e2b5e7b8c4c61506aa36e85645fa100bca574e2c45cec4b9430b45fbecd71e882042d9c1133f4bf9317e0c2456360aea09c98267d35a75850a834ed5e873ec74d08cdeeaf0b763d0fb53122dfadcce4fb1fb69ea4f09cd3db34dd1c4c7f8e867670f9403aba1b0a0e9633c62fd2b33d343919a4cd745aa2c6f4a91c95a1a1554abf3050c192229fd0977782ddd91d1869bfca6d50696261c3a1c78d3be2ee61c92fe7db5e605c113b4aa36cb17b0e0379f4a4d6757f889d914c383793c7a5b364b6bc1b77bdcbeb6f4b06aaf8267294dd267acf3a27a7e681b893b313c8464cea69acb0b3684cebc34e8572679a5cfcbf5652050793f9120bbce983edc9bc77e8672200032cd59fb5d7cbaa510f585ab83c14f8a8463009fe75b7642e64fc4fdbe0c54c081bbbeaa36591d5db967a9917695edae81ad7c13e688088b54649cfb0227af6fedb2ec018cac796559c445fc184e58bb7ed8d4ebacc3e2ec5976e6cf751fbb9510c174f2abd615a3e501aa52877121d3b687c5b3c300a7ceef43096515e19ad31ce565ff3041eb73ab2043b206ea5030bc86ead9b86cb399d67a04f6acd026f655461842f08967e17d316cd9c60920c9ba814afd7d9055f541fa11ba87bf58e671037760cf4e5042a97431f5f4d980fa1ebf96845a4b9807bf63fc633e14acb1130da6e9b197a57ae8d2a2b7eb34088578a0bf577e270f6f4fc5eef8d92e60b7dd7231ff36691e7fe10c545ba36996f314aaaa12155c16367e80259f7dfd912829e08a27bf40c112fceabf8f2fae87745422ec05399901538d4e4955e29f7970b8c16b37ee86266a118ac81dad0b7c31af529b7088c4bc42f8f64628b200071d7183ef7f12852a38d66972b116b33bf163d57ab7fdf1c1f28af389daa55132451302710731df250e04ea2d133ea8496e2d827a60827f27d3f78795244ee5c540e82067d62cca9abe6694c9b6f206ba76001283cb80c25e3fea5598c3d96a1ccc6b7b323450b9f3431075cd655c21fc303c2b2fe6bb5117ba5ccec8dde909d5aa2c38acaffbc26965a980ea985fe4f9b3574919e1063a6b53a9deff45a668f9fe8b39c46401a4e21720200d7e332685b8a0675b46c2b9e24aea4c32afc7652112cfc361aec2800ba89da7cdf7f72af133a2984895b0fa820da761b96619eab9cdf912ef10fd90bf7af95d1a3ebb12ffe2b049e2270686c4f2f5d8f94e8fcd1baefef95df8ed4369cd388ea1d9ea018a9b708223d6ca98d80088ab5720bd7b83cdad128fb1111b4f8b6a2485006082ffb3e28f26578f3a5a8972a1e53f3ade0827211993f71cfbe481a83d83bd7297914429cd1c14aa1fa6e4255d643ed6adabdb3775152f919676434184b810350b3dc344312ef5450888d28629eae346e6f51925922a6028a6d4b2daa070cfb8493a92210702551cbf6c4fefbe87976886eb4f096f8c1a7a7e2be88506b8b54ec722a47fd63741f4579a241141ea952d9c1d06cc17d81a95130c9bcf2c323779485f3fc26657bbea6a87bb0c8a0b0c1ca3ec043149820a3d56657ae04a19949a2260226eb87a5d47fd0fff40d855f36d2bcadd64e249189014f6b60f5a24acb826b02059a90b63450379e84d5e2e2fc78b39a48c0ab9e3279babc4fb382a76cf34efd7f08927b94a127edcc9a37a77afda03a8755dc714eda5a47c143abf824aa70fa779cc9a2ccbd93eed87fe6645cd89a512d8094c2ea9c4488d5da80e8af2129f1fb0b22d03116398f146db6f5d61774040d5c53850c47a069dccb33d199b805522ab9002acdf508acc4a6fd4cfa58d9a22c298ed3f2fa76dc2e4b96579ae22fceb518d3b1cecd8ae063e2dda822f6b939e2fb20a87fbf79abaa9eea736b729cc4931fbfe837baccd695a97fa2b315ee27b787f16538e53d0214be7226af10657335d5b2a883498ba0f49df8fcffd8410fb5c331c7c022a14202f5e568919e2e47b34c0390bd2826fe0f241f9ec01d9498ff3cb47ddf340ac17801b56155ac8bedc4cd4a06aeda9994336a49e446188f2e8fadfaa1559f99d6829e3e2359a9fbcb3f26774cd9bb2a8aa451d794f4f56560ea0c7b577603596777c29c85047482525950be016c771d4d138b4d8cbf685d04c2230633e2e50eef325dbdbcfe0512b32dffc1cb79b2f03793fb1e267f7a3b7863c4f972f98c3d22309ce2d475746d1b3ffdead874ec69b832048e84c1749fe345066bcccb3531bef9af63e0f9d5d2ed7cf4eb74f9084ca10d494d1ee1dbc42f1eb5c5c273a406f9819db57b2647bf113828ad42302fa93cfdfc38e8af1dc5560a2d96594f650714f160294de97203890c1837510c3ac5e356219e3742526f9a0931ceace2eef1e3f0d3479733451190be65b7732387b0bb8919b2772b936ccf025cededdc14314899d40493866d1ab6191653"}, @iv={0x40, 0x117, 0x2, 0x25, "9f8de407fd74f51656d21963b8004e29268b7f469ba21660f86afa7ac3b0a8ada1de3d59a5"}], 0x1070, 0x4000000}, {0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000002940)="7a26346c009533ba7f0e65dd0d559f9bd509d3db8a690438b99e409a08097010a6d3f9b17b3ef342d0ef74b2142c66c62f8d7a15a217003ead10c59a9cd3c0d475b9753e93b3ec3ea5eb659bee67d79ce205c5452cafa53af76edae049cf7af7bc9a71296d411be6d7e62eeee91fe092b87b51caa07ee9b0d4ffe9eb3ac6fb9f3da70bd7879453d2cadfeb7a6fdddf6526da466bf6ce084b43a2abe5852dc1b61085e5708141940aaadf1602b9c9190567aec4878c7075faad216dc818afcaf058618ac47afb3f61889107a1a5b405713767b526e592d1046cc87cd0794bdd13f1c368a283c9708e13245d0a1e1cf476", 0xf0}], 0x1, &(0x7f0000002a40)=[@iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @op={0x18}, @iv={0x20, 0x117, 0x2, 0x9, "a81c92637d9d317b5c"}, @op={0x18}, @iv={0xd8, 0x117, 0x2, 0xbf, "c29ffbe2984162ebd0b3b4595ce6a2364dc4d60b46a330479fd1f43f668bba76bcd0d943c061f5495fdf879a20b348b594b6d6aefd88d04177b72a319f45430a9007935c54c434a2fdb33c3f1df3d9a40ad90a538bdbb0955ab10f6c918d094649a9fcd978175598ceeedc4ae22adc3de541aab1fd1e547ff3311aac2778d5a308dfae41435be41b04d5b0f2dd15da5cbd087a8a0c6a9d32964e42af75d2dc901e9535ee58a9e2fb0fdbd2eb2e2b0c20da497e7f8c95441f2e9e42824c9081"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xffff42f0}], 0x1170, 0x20000000}, {0x0, 0x0, &(0x7f0000004d80)=[{&(0x7f0000003bc0)="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", 0x1000}, {&(0x7f0000004bc0)="b35888dc13dc7382e0f5da1e22ae6c8e28bc0209e26bb12884425fec2350786dc12b05bbb37f7386cb4a9325ddee51caecc6e3a070cbae41a885151bd9825a83cfe80d1b3c17a65402518dcbb1412a6e4ff14090bdbb3f41ef1b3faddd874a38a91f1d70147d22e980350b77b05ad04a0cfc204f46cf9c99441f58ff8bd8ebee0cd08dd214ed5a4d5b3b1dbd7a2b80469856fcb1ca6d34d7b00f995b14ec2b15cd3b32f13c195fa6fbf08a5b5aff632bb89ef9c02adc56e132d819aa69c2d6363c6058d4a765d3e48b3daa3803fad5e8f4b1bfd663f33acb68a73813cae7e3851ec353dace11e6947a332244a3b3544b92a8bb78c0cb38dce8", 0xf9}, {&(0x7f0000004cc0)="9c8fe11a55828eaa438902d24b17bc70bb43", 0x12}, {&(0x7f0000004d00)="76a68b8e30ac66a449bca1d51363434d44bec5be8baca9de07b71c3c4c0ee0b4db61288f38f1f096ae5b413aae7752fc6061418dddbc5e7eb780f2b1996ae0022a5f50228c4b6ef99eab033dd52bb5e923c259ab93865975efc804bfaad4f614e22b30a886454718a0482ab2c0b0", 0x6e}], 0x4, &(0x7f0000004dc0)=[@assoc={0x18, 0x117, 0x4, 0x3b48}], 0x18}, {0x0, 0x0, &(0x7f0000005ec0)=[{&(0x7f0000004e00)="02da4e232cca2ba92013cab28a2ce00684e1ab246dc214f79893a41d8466010e5a011ac7ba8eb110c372c06b111551", 0x2f}, {&(0x7f0000004e40)="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", 0x1000}, {&(0x7f0000005e40)="ea3b16254f5f16cee0df0ba862a5ec73b449977de086eda683414004b2f1a83380bb02ceee0324bb7fa74e0ff3986c024f60233adf5453747e3b96052c3ecda9234c903efe2d35b7c6f38aadda55acf47a7f93aea7629cb1bec16538d4278e320abe22e3e3a3e1103f4df5732c7b3cc1d2f749", 0x73}], 0x3, &(0x7f0000008700)=[@iv={0xf8, 0x117, 0x2, 0xdf, "05f2b84792f5662dd34bf200b07f561798cdf44192711e76c384333c992aaf7d98c55485dfd380d66c2d7e52cc42208c4f8909876005b5b0831ce538343261012bf7101423fd4251621cf0b40227b722b7ef1c67b019b3b00668dc400d0b9de754c0e363c44a5e679a31e3d104bc02f198e18b40d8a0724b60147546dd59c07fcfce36bda44abb3be5b41fba998528c2dca3cf4b2e605b504584b4ff0a49d212a0f8912b48f4038ebd430321bb1baa719b15489fb699ef41f74b8036bf1ea2982b282badd1679d160b2f7f3224bbcad76591409332f7247446321b61e6771f"}, @iv={0xf8, 0x117, 0x2, 0xe0, "07d6402c310f088b83685e1a9cf47780b487ab512594598ad36331c6c97c2c5afb8f1eadf3cd4f97ad3b32b61adc0456fc91960eda708e723097ae2b9ca1867c4f2d415731710f7a4831ab014a1d6781020c0ef051c17c1ae768ff0f32016577432d634b3573b42555be7a6c5b3e9d8cb2647a62361c88aed768ff49d6216840f6f5117172bf0331779f66229749013ec474cb338bc044a1259f54910883e899179e93b036a1a517e956565bcb2bc09f260fa32eb7f23dd9fc5140964cab82038cb0dd46da7959954d8ea1aa91273158e0e8d033dc94015929d752487fafb6cd"}, @op={0x18}], 0x208, 0x890}, {0x0, 0x0, &(0x7f0000008480)=[{&(0x7f00000060c0)="ac5824c37538783b85e0817266cbb67b20a8745448e37b197535b54686bd0c8970e44fe3f72c583efb97d913d083ed6aa2bf354ff6c55da383b065658db81fd47d997e2f29869b33e66110133c145a41c4ecab03f0598a25aafe0b5b30c390e9db4bd8d9d56c92589b9d24054421ec126e7e918ec7be1faecb4ba41e913a3b1da935150a67d5ea661f2cb7efedf05963a844a9e7b9a4f37b060065a38ade17f0504eb80d3735da2168db04f3a80586be7f9f43dc60595aee3656e7848b13911f4b4c016550223172d187a4b3dc480a6ce73c61d76c78e5", 0xd7}, {&(0x7f00000061c0)="303182bbd17427cb0c630cf4ae8c4b7d10893813edb4a985fa18f238419dd017c1ba22f49381162822ca8c6b2423523a293417c5ea7d9c00de0397f60ee56904324eb586570505292fd55afd94fe365a6eea78e8bf388080f872e03a7eba5bec4cdb3a87a6a559be27e668a976640b5ff073712ba0749561", 0x78}, {&(0x7f0000006240)="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", 0x1000}, {&(0x7f0000007240)="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", 0x1000}, {&(0x7f0000008240)="6cae559e7999ce34ccdf8a0a2a894e6ba8a3eb893dd84f56d430a5e47edbfc79ecff25077b86e3680f0a77c8a841b2958c82b98354c2966d22ccd76ad9f801a3aff1d5c0f1994fa4043d5b259c509e8f308be87ab98896d42279fa9f73d04752b62ae5c31b936f59ff58e2ee8329069ac937825d9de6f58a95", 0x79}, {&(0x7f00000082c0)="5f8ec9ff42c883c29824a33e47b81ed55232a7c0131b9176bc50cb16a52221900d16bb90751e42f066dd026ccb853978038ab693c04690d83ac3b1801c570110213759811180245d1f59c3b5dae4666f2a2a0f4f064e242fb6185026414a83b445d4efbf4ac4c3803f06ea7cb17cb1eb085926f281b2e629c5f4721f533d3c905d7efc2256de203db06f342dab558a182ed5de58f2e4851dd55842bab78b33dd2539dabc719b7fee3beac4", 0xab}, {&(0x7f0000008380)="2c8ee6cfb4c572e901b9d7c41efc3ac237872e585bf57bd73a8c6b18f622b5390bc1131e0385d70894cc20ac295c5ef5b26615fff81d21d8b470269f2a2807f14166fd47a24712a172dde603a674bafabb994c49bca8f227c7d6f182fae864996db34282c0764e50f22db4fd223c2bfe1e79d6af89f041c39fb34a51e0789e421770914ebc217a505ab26d00c027eddfb2939db0f103635681d4a3fb9300e8f76fbc65601887c1c11cdb670a8b5a81223ff8a034f0732ccc47d1f004044f79843a89fb087a22b55a1958bdb1d613f2af27231bd4dccf7b57456e723aae8063801f5bd97612f422d5fc0722c1446f10626f70", 0xf2}], 0x7, &(0x7f0000008500)=[@iv={0x80, 0x117, 0x2, 0x68, "1e58647540395b4f9a75c03c4479e79d2a784d42b430861df30feb08c63eeaad84ec4dd73be68cd138dd0db03d873a713c876a3d7e9b6403577de8829770342ca70d65efe1f63be8ffddf0636aa1c00d62f14876f5ff58add6c042fac18e4737a8ee64ca6bb57f31"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0xb0, 0x4004084}], 0x5, 0x4000842) [ 278.773947][ T9100] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 278.898857][ T9112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 278.964776][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 278.979900][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 279.012906][ T9112] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.072745][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 279.133298][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 279.167940][ T9151] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.175122][ T9151] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.287730][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 279.305947][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 279.321495][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 279.342645][ T9104] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.349829][ T9104] bridge0: port 2(bridge_slave_1) entered forwarding state 03:30:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xa0000000, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r4, 0xc1205531, &(0x7f00000002c0)={0x4125, 0x1, 0x6, 0x7, [], [], [], 0x400, 0x6, 0x2, 0x1, "04b99d4378fe849aa1ae206359a8b1ca"}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socket$bt_hidp(0x1f, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) set_thread_area(&(0x7f0000000140)={0x2, 0x20000800, 0x42cb2ab9904cc5a1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1}) r9 = socket$inet(0x10, 0x2, 0x0) sendmsg(r9, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000000)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f038b0503000800080016000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 279.414378][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 279.450723][ T9359] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 279.471503][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 279.499919][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 279.522521][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 279.544349][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 279.564385][ T9104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 279.601135][ T9112] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 279.640433][ T9112] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 279.661799][ T9368] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 279.813531][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 279.823078][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 279.832517][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 279.861025][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 279.879396][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 279.890101][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 279.957186][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 279.964755][ T9151] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 279.977918][ T9112] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 280.012840][ T9381] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) 03:30:10 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x800, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x17) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x100, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000080)) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0xbf52, 0x102) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x4}, 0x68) r3 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x4, 0x410100) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f0000000280)={0xa, 0x4}, 0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) capget(&(0x7f0000000340)={0x19980330, r4}, &(0x7f0000000380)={0x0, 0x4, 0xffff, 0x1, 0x4}) r5 = socket$inet_smc(0x2b, 0x1, 0x0) accept4(r5, &(0x7f00000003c0)=@generic, &(0x7f0000000440)=0x80, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000480)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0xfffffffd, 0x6, 0x80, 0xfe, 0x10000}, &(0x7f0000000540)=0x98) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000580)={r6, 0xdfa4, 0x292c}, 0x8) r7 = socket$rxrpc(0x21, 0x2, 0x14) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f00000005c0)={'syz_tun\x00', {0x2, 0x4e23, @remote}}) socket$inet_udp(0x2, 0x2, 0x0) r8 = accept4$llc(0xffffffffffffffff, &(0x7f0000000600)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000640)=0x10, 0x800) ioctl$sock_inet_SIOCGIFPFLAGS(r8, 0x8935, &(0x7f0000000680)={'nlmon0\x00', 0x5}) ioctl$VIDIOC_DBG_G_CHIP_INFO(0xffffffffffffffff, 0xc0c85666, &(0x7f00000006c0)={{0x4, @addr=0xffffff01}, "2910201912729195071b391235fada72575ed2e14adbb970d7f60766dca2cf29", 0x1}) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/capi/capi20ncci\x00', 0x8100, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r9, 0x0, 0x80, &(0x7f0000000b00)=@filter={'filter\x00', 0xe, 0x2, 0x294, [0x0, 0x20000840, 0x20000870, 0x200009a6], 0x0, &(0x7f0000000800), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x3, 0x42, 0x812d, 'batadv0\x00', 'nlmon0\x00', 'veth1_to_hsr\x00', 'rose0\x00', @broadcast, [0x0, 0x0, 0x0, 0xff, 0xff], @local, [0xff, 0xff, 0xff, 0xff, 0xff], 0xce, 0xce, 0x106, [@vlan={'vlan\x00', 0x8, {{0x4, 0x4, 0xf6, 0x4, 0x1}}}, @connlabel={'connlabel\x00', 0x8, {{0x6, 0x6}}}], [], @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{0x3, 0x2c, 0x88e7, 'yam0\x00', 'eql\x00', 'bridge_slave_1\x00', 'rose0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x5e1571dbc8012190, 0xff, 0xff, 0x0, 0x1fe], @local, [0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x6e, 0x9e, 0xce, [], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xae74}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc}]}, 0x30c) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000bc0)={'filter\x00', 0x7, 0x4, 0x480, 0x258, 0x0, 0x258, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000b80), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@random="d6117bc5483e", @broadcast, @loopback, 0x2}}}, {{@arp={@dev={0xac, 0x14, 0x14, 0x20}, @rand_addr=0x2, 0x0, 0xff000000, @empty, {[0xff, 0xff, 0xff, 0xff]}, @mac=@remote, {[0xff, 0x80, 0x0, 0xff]}, 0x1, 0x6, 0x9, 0x1, 0x4, 0x3, 'nlmon0\x00', 'rose0\x00', {}, {0xff}, 0x0, 0x2}, 0xf0, 0x118}, @unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x5}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@random="dc018dad51bc", @broadcast, @rand_addr=0x3, 0x1, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) r10 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_PRIORITY(r10, 0x80045643, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_netdev_private(r11, 0x89f2, &(0x7f0000001100)="28ef2a576af885a9b8056330ecc4f37c07960bd30d69da6112b3f641e175ce1f79a83941be48186576e86035a38fb1a6249cfc03088596cf26769331cf4fe66ef6d1c3ee32e6161e11b29fbd2236f0dabc57750ccdb54cb691730ea87273460ec2556e139288e88a30f5a93ce2e46471df36f7950a1e130d1435ea75e041fba909a597e1be78a27a660949") ioctl$TCXONC(r3, 0x540a, 0x9) fadvise64(r8, 0x9, 0x6, 0x3) r12 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$BLKDISCARD(r12, 0x1277, &(0x7f0000001200)=0x5) 03:30:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() semget$private(0x0, 0x2, 0x0) eventfd(0x7) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc08c5102, 0x0) ioctl$CAPI_NCCI_GETUNIT(0xffffffffffffffff, 0x80044327, 0x0) io_setup(0x1, &(0x7f00000000c0)=0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) io_cancel(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x5, 0x6, 0xffffffffffffffff, &(0x7f00000002c0)="bf66f8fcdac3f63501fc84d7b9b16b0c4a51d4e322456820a173d19f328f5ac102971458cd33995b6f1599e29ddd1370e9e5ccba8f3801e1de8ebe04e8efa532b7aec50fe4c53c666edebacdf1bec97b481cd4dd848fbbb1394379fdcc6017617ced3428c227d94b2b0ee81fe8cfa81b65466a0e9dbcd490d6cb812975ee7bb568df4f31acb9300e00f701c212289511ad03857dbc0adcc0fec0cd6fe974bfcd57189a1b86db", 0xa6, 0x3}, &(0x7f00000003c0)) ftruncate(0xffffffffffffffff, 0x86) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=""/163) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) msgget(0x3, 0x100) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = accept(r1, 0x0, 0x0) write(r2, &(0x7f0000000100), 0x1ede5) shutdown(r2, 0x2) sendto$packet(r3, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) 03:30:10 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1007, &(0x7f0000000200)=""/4103, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000001240)={r4, @in6={{0xa, 0x4e24, 0x20, @ipv4={[], [], @multicast1}, 0x7f}}, 0x10000, 0x1b, 0x6, 0x1, 0x40}, &(0x7f0000001300)=0x98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(r6, 0x7002) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="950620989f316bc8bf8f68136ea1", 0x0, 0x6f5a}, 0x28) 03:30:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000140)=0xc) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) recvmsg(r5, &(0x7f00000005c0)={&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000400)=""/132, 0x84}], 0x1, &(0x7f00000004c0)=""/199, 0xc7}, 0x10100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r12, 0x84, 0x1, &(0x7f0000000600)={0x0, 0x9, 0x6, 0x0, 0xfffffff9, 0x3}, &(0x7f0000000640)=0x14) getsockopt$inet_sctp_SCTP_CONTEXT(r10, 0x84, 0x11, &(0x7f0000000680)={r13, 0x6fc}, &(0x7f00000006c0)=0x8) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r14}, [@IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@vti_common_policy=[@IFLA_VTI_LINK={0x8, 0x1, r14}]]}}}]}, 0x38}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="2000000014000100000000000000000002000000", @ANYRES32=r14, @ANYBLOB="08555753854d0002"], 0x20}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=@ipv4_deladdr={0x20, 0x15, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r14}, [@IFA_LOCAL={0x8, 0x2, @multicast2}]}, 0x20}}, 0x0) 03:30:10 executing program 2: ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000fed000/0x1000)=nil, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() fcntl$setownex(r0, 0xf, &(0x7f0000002ec0)={0x0, r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x27c}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8d940, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x101000, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x7fffffff, 0x6000) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000240)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$void(r7, 0xc0045878) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@empty, 0x0, 0x7, 0x0, 0xd, 0x8, 0x20}, 0x20) umount2(&(0x7f0000000540)='./file0\x00', 0x4) 03:30:10 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40a104, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r2 = getpgrp(0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x3, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setpriority(0x0, r2, 0xffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000140)={0x6, 0x6, 0x8, 0x5, 0x2, 0x3, 0x6}) socket$isdn(0x22, 0x3, 0x25) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8b04, &(0x7f0000000000)='wlan0\x00') socket$inet(0x2, 0x4000000805, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000200)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000780)) 03:30:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000140)=""/9) r3 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 280.401114][ T9410] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:10 executing program 0: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80000, 0x0) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYRESOCT=r4, @ANYBLOB="000000002567c8350000000000000040626f6e64000000001400020008000500020000000800010004000000"], 0x3}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r8, &(0x7f0000000140), 0x52b, 0x0) [ 280.911432][ T9433] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:30:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x36}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1007, &(0x7f0000000200)=""/4103, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000001240)={r4, @in6={{0xa, 0x4e24, 0x20, @ipv4={[], [], @multicast1}, 0x7f}}, 0x10000, 0x1b, 0x6, 0x1, 0x40}, &(0x7f0000001300)=0x98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(r6, 0x7002) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000080)="950620989f316bc8bf8f68136ea1", 0x0, 0x6f5a}, 0x28) 03:30:11 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./?\x00\x00\x00up.net/syz1\x00\xd8\xfd\xa4\x06\xeb\xfcc\x04\xf4\xcb\x11K\xb3\xc2\xb30(\r\xaa\x1d\x93\xe4\x8b\x93YX\xe8p\xa18\x9e\x01\xb8\x19\xc1\xb0\xf5\xbb\x0fgi\xdc\xfc)\xb2z\xcb\xcbh\xa6\xc7B8Q\x89\xc2\x9d?A\x97\x1a\xbc\x95\x92\xa5,\x9a\xaa\xc3\x94\xf3^\x88\xda\xe7r\x9a\xc5\xf9\x8f\xc2\x8e9,xS\xdb\x9b\x0eg\x10\x88\xd6\xdcLO\xab\\%\x1d\r\xcf\xaf\xa3\xddU\f/|(dy\xea~.\x19\x0f\xd6\xebh\xd2H\x81\xb8\xfaw\fpF\xcd\x8f8k\xac\x85\x1dA\t~_\x91v\x16\x0f\x9d\a\xa2\xc9\xcb\x9b\xebvr\xe8\x01\xcd\xdbW\xfd\xda\xf5H\x9a/0\xc8\xecod\x14&b\xca3L}Pvr\x86\xf1\x8c,\xf6A\xc3\xddd', 0x200002, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) openat$cgroup_int(r0, &(0x7f0000000440)='cpuset.cpus\x00\xaa\xef+e\xcb\x98\xe6xm\xbe\xf2F\x96%\x12G\xc8X`\xed\xbe\xce\xdea', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000280)='pids.current\x00', 0x0, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000240)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x33ee86459f64b6d0) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'U-', 0x6}, 0x28, 0x1) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) connect$l2tp(r7, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r7, &(0x7f0000005fc0), 0x800000000000059, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r9, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r10, 0x300, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x8840}, 0xc00c030) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)={{0x0, 0x0, @identifier="285a7b0c6e6e0af3512a39e769ec7dd1"}, 0xa4, [], "b782c654db3792be52847094e80cc6749203221a6144d96754439057b86dad768725ce1e1732528ffa2ea1b81138b62de060dbf6bae79602177c859d065dcf9720548b37359c133761000c1c6373f2c0f0b5e7b051217559ecb3d61357f1e9e3081358bb0f6d107440e49e4f0983ad4eea6e64c2b980998f4ece502c6e329115b86d94a5b1152e9e7ab82c51641a12d3cef792a7bef5a7b4f0136e90b35913ea2f036d54"}) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000200)=@gcm_256={{0x304}, "d86f6b2a3088c26d", "ea329038970397ecc4fe6197f157bc00597a57f86f34a54e82a42c4f34ec63ad", "04000200", "588d71b7fd050cd8"}, 0x38) [ 281.117262][ T9455] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000140)=""/9) r3 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 281.203688][ T9412] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:30:11 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getpeername$packet(r4, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfec8) socket$inet(0x2, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$EVIOCRMFF(r5, 0x40044581, &(0x7f0000000080)=0x8001) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x4, 0x1f, 0x2, 0xfffffff9, 0x20, r5, 0x8000, [], 0x0, 0xffffffffffffffff, 0x5, 0x1}, 0x3c) signalfd(r6, &(0x7f0000000100)={0xe7f}, 0x8) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:30:11 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006111485ccedd3a0bc9070500", @ANYRES32=0x1, @ANYBLOB="000000000000000000000000e2000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xb7, &(0x7f000000cf3d)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10}, 0x70) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x9b) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f00000002c0)={@loopback, @broadcast}, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) r6 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x10, &(0x7f0000000440)={r7}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000080)={r7, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000140)={r7, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000200)=@assoc_value={r8, 0xffff0001}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f0000000100)=0xfffffffe) [ 281.407748][ T9465] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 281.456536][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 281.456552][ T26] audit: type=1804 audit(1574739011.743:31): pid=9466 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir281510379/syzkaller.LlSDJv/3/file0" dev="sda1" ino=16539 res=1 03:30:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() semget$private(0x0, 0x2, 0x0) eventfd(0x7) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc08c5102, 0x0) ioctl$CAPI_NCCI_GETUNIT(0xffffffffffffffff, 0x80044327, 0x0) io_setup(0x1, &(0x7f00000000c0)=0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) io_cancel(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x5, 0x6, 0xffffffffffffffff, &(0x7f00000002c0)="bf66f8fcdac3f63501fc84d7b9b16b0c4a51d4e322456820a173d19f328f5ac102971458cd33995b6f1599e29ddd1370e9e5ccba8f3801e1de8ebe04e8efa532b7aec50fe4c53c666edebacdf1bec97b481cd4dd848fbbb1394379fdcc6017617ced3428c227d94b2b0ee81fe8cfa81b65466a0e9dbcd490d6cb812975ee7bb568df4f31acb9300e00f701c212289511ad03857dbc0adcc0fec0cd6fe974bfcd57189a1b86db", 0xa6, 0x3}, &(0x7f00000003c0)) ftruncate(0xffffffffffffffff, 0x86) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=""/163) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) msgget(0x3, 0x100) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = accept(r1, 0x0, 0x0) write(r2, &(0x7f0000000100), 0x1ede5) shutdown(r2, 0x2) sendto$packet(r3, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) 03:30:11 executing program 1: sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000380)={0x1c}, 0x1c}}, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) socket$bt_rfcomm(0x1f, 0x1, 0x3) close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000300)={r2, 0x4, 0x20, 0x6}, &(0x7f0000000340)=0x18) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x10}, 0x10) pselect6(0x40, &(0x7f0000000140)={0x5, 0xfffffffffffffffb, 0x1000, 0x92f0, 0x4, 0x9, 0x5, 0x9c}, &(0x7f00000001c0)={0x100, 0x7fffffff, 0x8001, 0x9, 0x10000, 0xfffffffffffffffd, 0x8, 0x2}, &(0x7f0000000200)={0x2, 0x9, 0x65aacd3b, 0x6, 0x6, 0x4, 0x1fe, 0x8}, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={0x7b}, 0x8}) 03:30:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000140)=""/9) r3 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:11 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x1) open(0x0, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) openat$cgroup_procs(r1, &(0x7f0000000400)='cgro\xff\xff\xff\xff\xff\xfe\xff\xffds\x00', 0x2, 0x0) socket(0x40000000015, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000300)={0x2, 0x4e24, @local}, 0x10) r3 = socket$inet(0x2, 0x0, 0x9) sendto$inet(r3, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x2) ioctl$int_in(r2, 0x5452, &(0x7f00000003c0)=0xe1) shutdown(r2, 0x1) accept4(r2, 0x0, &(0x7f0000000080), 0x80000) bind(0xffffffffffffffff, &(0x7f0000000100)=@xdp={0x2c, 0xc, 0x0, 0x2a}, 0x80) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r4, 0x0, 0x100000351, 0x20020059, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r6, r9) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$int_in(r0, 0x0, &(0x7f00000004c0)=0xe0) 03:30:11 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./?\x00\x00\x00up.net/syz1\x00\xd8\xfd\xa4\x06\xeb\xfcc\x04\xf4\xcb\x11K\xb3\xc2\xb30(\r\xaa\x1d\x93\xe4\x8b\x93YX\xe8p\xa18\x9e\x01\xb8\x19\xc1\xb0\xf5\xbb\x0fgi\xdc\xfc)\xb2z\xcb\xcbh\xa6\xc7B8Q\x89\xc2\x9d?A\x97\x1a\xbc\x95\x92\xa5,\x9a\xaa\xc3\x94\xf3^\x88\xda\xe7r\x9a\xc5\xf9\x8f\xc2\x8e9,xS\xdb\x9b\x0eg\x10\x88\xd6\xdcLO\xab\\%\x1d\r\xcf\xaf\xa3\xddU\f/|(dy\xea~.\x19\x0f\xd6\xebh\xd2H\x81\xb8\xfaw\fpF\xcd\x8f8k\xac\x85\x1dA\t~_\x91v\x16\x0f\x9d\a\xa2\xc9\xcb\x9b\xebvr\xe8\x01\xcd\xdbW\xfd\xda\xf5H\x9a/0\xc8\xecod\x14&b\xca3L}Pvr\x86\xf1\x8c,\xf6A\xc3\xddd', 0x200002, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) openat$cgroup_int(r0, &(0x7f0000000440)='cpuset.cpus\x00\xaa\xef+e\xcb\x98\xe6xm\xbe\xf2F\x96%\x12G\xc8X`\xed\xbe\xce\xdea', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000280)='pids.current\x00', 0x0, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000240)) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x33ee86459f64b6d0) r7 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r3, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, 0x1c) fsetxattr$trusted_overlay_nlink(0xffffffffffffffff, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000480)={'U-', 0x6}, 0x28, 0x1) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) connect$l2tp(r7, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r3, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r7, &(0x7f0000005fc0), 0x800000000000059, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r9, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x38, r10, 0x300, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x8840}, 0xc00c030) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000004c0)={{0x0, 0x0, @identifier="285a7b0c6e6e0af3512a39e769ec7dd1"}, 0xa4, [], "b782c654db3792be52847094e80cc6749203221a6144d96754439057b86dad768725ce1e1732528ffa2ea1b81138b62de060dbf6bae79602177c859d065dcf9720548b37359c133761000c1c6373f2c0f0b5e7b051217559ecb3d61357f1e9e3081358bb0f6d107440e49e4f0983ad4eea6e64c2b980998f4ece502c6e329115b86d94a5b1152e9e7ab82c51641a12d3cef792a7bef5a7b4f0136e90b35913ea2f036d54"}) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f0000000200)=@gcm_256={{0x304}, "d86f6b2a3088c26d", "ea329038970397ecc4fe6197f157bc00597a57f86f34a54e82a42c4f34ec63ad", "04000200", "588d71b7fd050cd8"}, 0x38) 03:30:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() semget$private(0x0, 0x2, 0x0) eventfd(0x7) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc08c5102, 0x0) ioctl$CAPI_NCCI_GETUNIT(0xffffffffffffffff, 0x80044327, 0x0) io_setup(0x1, &(0x7f00000000c0)=0x0) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000080)) io_cancel(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x5, 0x6, 0xffffffffffffffff, &(0x7f00000002c0)="bf66f8fcdac3f63501fc84d7b9b16b0c4a51d4e322456820a173d19f328f5ac102971458cd33995b6f1599e29ddd1370e9e5ccba8f3801e1de8ebe04e8efa532b7aec50fe4c53c666edebacdf1bec97b481cd4dd848fbbb1394379fdcc6017617ced3428c227d94b2b0ee81fe8cfa81b65466a0e9dbcd490d6cb812975ee7bb568df4f31acb9300e00f701c212289511ad03857dbc0adcc0fec0cd6fe974bfcd57189a1b86db", 0xa6, 0x3}, &(0x7f00000003c0)) ftruncate(0xffffffffffffffff, 0x86) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=""/163) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) msgget(0x3, 0x100) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x0, 0x0, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = accept(r1, 0x0, 0x0) write(r2, &(0x7f0000000100), 0x1ede5) shutdown(r2, 0x2) sendto$packet(r3, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) [ 281.651547][ T26] audit: type=1804 audit(1574739011.763:32): pid=9469 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir281510379/syzkaller.LlSDJv/3/file0" dev="sda1" ino=16539 res=1 [ 281.731819][ T9482] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 281.777990][ T9483] BFS-fs: bfs_fill_super(): loop1 is unclean, continuing 03:30:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000140)=""/9) r3 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 282.008748][ T9479] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:30:12 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x82, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x5862, 0x3, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffd}, 0x0) r1 = open(0x0, 0x121141, 0x189) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r2 = shmat(0x0, &(0x7f0000003000/0x4000)=nil, 0x641fe379db422160) shmdt(r2) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) close(0xffffffffffffffff) io_setup(0x401, &(0x7f0000000040)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000680)) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000640)={0x3b, 0x6, 0x9, 0xa, 0x9, 0x7ff, 0x2, 0x7e, 0x5b1f66dcfacf68ec}) fchdir(r5) r6 = memfd_create(&(0x7f0000000780)='\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$nfc_llcp(r8, &(0x7f00000000c0), &(0x7f0000000140)=0x60, 0x800) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r6, 0x0) gettid() creat(&(0x7f0000000100)='./file0\x00', 0x10003) [ 282.102112][ T9508] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000140)=""/9) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000140)=""/9) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:12 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x28c300, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000280)={0x7, 0x21, 0x2}, 0x7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r2, 0xc0a85322, &(0x7f0000000580)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000300)={{{@in=@loopback, @in=@dev}}, {{@in6=@empty}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x81, 0xffffffc6, 0x0, 0x0, 0x93000000}}, &(0x7f0000000240)='syzkaller\x00', 0x1, 0xc3, &(0x7f0000000480)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) r9 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r9) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r9, 0x84, 0x10, &(0x7f0000000440)={r10}, &(0x7f0000000480)=0x8) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r11, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000040)={r10, 0x3}, 0x8) 03:30:12 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2001, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0, 0x13}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0xb0ab5efcdec0379) sendto$inet6(r0, &(0x7f0000000980)="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", 0xfb, 0x40000, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r1, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0xfffffffdfffffffd, 0x41363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x80805, 0x0) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={r5, 0x7ff, 0x420}, 0x8) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) r7 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x10, &(0x7f0000000440)={r8}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000080)={r8, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)={r8, 0xf2, "ce997cc1ea9455d43442e9a24b7f31e930d785a549a3311b965a68522a0e824f80c2b4a849d50b1b95084ca735046665a35ff5f045ab65f90747a3c7dfe8604c5910d9ff3f76c5bb248d9f6ebb4a9162506eb2509ac2a2e33c92d4264da739901b1216c042c8e3beb7c1c6c9cd96c6af95861bb9a08b0b9e1e640f9e1c55b064d36e565af77e72681162f37e77cfb4ee53940f441ad7856a44e8bef14c6c739a7e882a530c524ea9e84e157f743bd1ae7e282e9b786fe46ace41d7c1a622d24a48f865907d2d0654e94db6b367acf2917d3b727df23903a5454d4d414f3dd469f81bfb8b56954d127b0e2bbba16349640abe"}, &(0x7f0000000040)=0xfa) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0) write$uinput_user_dev(r9, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}, 0x45c) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r9, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r9, 0x5501, 0x0) r10 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r9, r10, 0x0) ioctl$UI_DEV_DESTROY(r10, 0x5502) getsockopt$ARPT_SO_GET_REVISION_TARGET(r10, 0x0, 0x63, 0x0, &(0x7f0000000240)) socketpair(0x4, 0x80000, 0x3c, &(0x7f0000000880)={0xffffffffffffffff}) getsockname(r11, &(0x7f00000008c0)=@hci, &(0x7f0000000940)=0x80) 03:30:12 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000c34000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000080)={{&(0x7f0000291000/0x400000)=nil, 0x400000}, 0x0, 0x6000000}) 03:30:12 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x1) open(0x0, 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) openat$cgroup_procs(r1, &(0x7f0000000400)='cgro\xff\xff\xff\xff\xff\xfe\xff\xffds\x00', 0x2, 0x0) socket(0x40000000015, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000000)=0xffffffffffffffff, 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000300)={0x2, 0x4e24, @local}, 0x10) r3 = socket$inet(0x2, 0x0, 0x9) sendto$inet(r3, 0x0, 0x0, 0x10, &(0x7f0000000080)={0x2, 0x4e20, @multicast2}, 0x2) ioctl$int_in(r2, 0x5452, &(0x7f00000003c0)=0xe1) shutdown(r2, 0x1) accept4(r2, 0x0, &(0x7f0000000080), 0x80000) bind(0xffffffffffffffff, &(0x7f0000000100)=@xdp={0x2c, 0xc, 0x0, 0x2a}, 0x80) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r4, 0x0, 0x100000351, 0x20020059, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) dup2(r6, r9) fcntl$dupfd(0xffffffffffffffff, 0x0, r7) ioctl$int_in(r0, 0x0, &(0x7f00000004c0)=0xe0) 03:30:12 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000140)=""/9) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x338) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0xc6f40200, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x70d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x9}]}}}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xc6f40200, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f5864000000000c0002000800090000000000"], 0x3c}}, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x2a0000) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x20, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20008004}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=r0, 0xfb208fd8a36c7788) 03:30:13 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) r4 = geteuid() setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, r4, 0xee01, 0x80, 0x319a}, 0x81, 0x4, 0x0, 0x20, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="a7998db30000000001007e0800000000000000c99b917c38a73d132d86e79a"], 0x1f) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@remote}) r6 = socket(0x10, 0x2, 0x0) write$P9_RREADLINK(r5, &(0x7f00000002c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_PARM(r7, 0xc0cc5615, &(0x7f0000000000)={0x4}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000240)={0x8001007, 0x1}) getsockname$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 03:30:13 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r0 = getpid() gettid() sched_setscheduler(r0, 0x2, 0x0) prlimit64(r0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x10392, 0x2, 0x1, 0x3f, 0x3, 0x0, 0x0, 0x4}, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f00000000c0)={0xa14, 0x9, 0xe9e7e898, 0x3ff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) pipe(&(0x7f0000000300)={0xffffffffffffffff}) close(0xffffffffffffffff) socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000100)='./bus\x00', 0x101, 0x3, &(0x7f0000000340)=[{&(0x7f0000000140)="3f838f039f99b6", 0x7, 0x5}, {&(0x7f0000000200)="2bc76eaff4faf447cf4e4d65e53c82e48e9a64a5dcd4ca30aa10fd0eaf255172a1290a47d008d6b0a30a9ec010687ab104e1013eb4716730235a46884d62e69dac393a71f807369ec467093e7ab6a106f4", 0x51, 0xfffffffffffffff8}, {&(0x7f00000002c0)}], 0x40402, &(0x7f0000000400)=']vboxnet0.$$louserwlan0wlan1&bdev\x00') r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r6, 0x4008ae6a, &(0x7f0000000780)=ANY=[@ANYBLOB="010000000000000000000000040000000000000000000000ddff0000fd000000000000000000000000000000000000007d740000000000000000f0124a61face70920ded5b264bcde8a2e4f31b033ec28b4e01991c194d35b22831c2716adfbe72f65002f4c281a2a3dc874108588befdb8852bea78e7dff87f6c3f06cbb182219a0e0dc19a35d6a20a0baa2ed8dbc6ac4b60b7f4e7ffe38f2fe2a2c4939b9b25f749f73e12d4bd5e87e95dd23edb42e1c32e320a5ca666680be"]) ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000000)={0x0, 0x800010}) write$binfmt_elf32(r6, 0x0, 0x0) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) 03:30:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 282.936420][ T9532] input: syz1 as /devices/virtual/input/input5 [ 283.136026][ T9575] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 283.335483][ T9580] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:13 executing program 2: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7, 0x22420) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="30000000240069be0287000000000000ffff000033a541a073018119998cdcb8d81a296cda546e4741f86a94c7fe77665da6f54bb20080000000000000cff1e6d312a031fc75ffca6e5b80db1671c4780973b38f7247035a657c3420313f92599ea4838e0b51ec084b432add272c687a385b229e8402fd40f739ad28a84d3ea0", @ANYRES32=r3, @ANYBLOB="00000300ffffffff00000000080001007069650004000200120fd1d1e487cc5c604daef67e7be9e8e3c8750fae1c61f3ede26c88174da61336482772ae843dd14e5e41823937590271ba84c407d84fcebe5e487744616a0a326900000000700e9cb70fc8530a86faa882fc2a56ceec315a2912"], 0x30}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(0xffffffffffffffff, r5) ioctl$BINDER_THREAD_EXIT(r6, 0x40046208, 0x0) r7 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r7, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000040), 0x6, &(0x7f0000000100)}], 0x125c2f739a2bf92, 0x0) [ 283.503322][ T9589] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x338) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0xc6f40200, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x70d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x9}]}}}]}, 0x3c}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0xc6f40200, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00000010000d0700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f5864000000000c0002000800090000000000"], 0x3c}}, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x2a0000) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x20, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}, 0x20}, 0x1, 0x0, 0x0, 0x20008004}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000040)=r0, 0xfb208fd8a36c7788) 03:30:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 283.659301][ T9548] input: syz1 as /devices/virtual/input/input6 03:30:14 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2001, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0, 0x13}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0xb0ab5efcdec0379) sendto$inet6(r0, &(0x7f0000000980)="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", 0xfb, 0x40000, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r1, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0xfffffffdfffffffd, 0x41363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x80805, 0x0) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={r5, 0x7ff, 0x420}, 0x8) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) r7 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x10, &(0x7f0000000440)={r8}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000080)={r8, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)={r8, 0xf2, "ce997cc1ea9455d43442e9a24b7f31e930d785a549a3311b965a68522a0e824f80c2b4a849d50b1b95084ca735046665a35ff5f045ab65f90747a3c7dfe8604c5910d9ff3f76c5bb248d9f6ebb4a9162506eb2509ac2a2e33c92d4264da739901b1216c042c8e3beb7c1c6c9cd96c6af95861bb9a08b0b9e1e640f9e1c55b064d36e565af77e72681162f37e77cfb4ee53940f441ad7856a44e8bef14c6c739a7e882a530c524ea9e84e157f743bd1ae7e282e9b786fe46ace41d7c1a622d24a48f865907d2d0654e94db6b367acf2917d3b727df23903a5454d4d414f3dd469f81bfb8b56954d127b0e2bbba16349640abe"}, &(0x7f0000000040)=0xfa) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0) write$uinput_user_dev(r9, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}, 0x45c) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r9, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r9, 0x5501, 0x0) r10 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r9, r10, 0x0) ioctl$UI_DEV_DESTROY(r10, 0x5502) getsockopt$ARPT_SO_GET_REVISION_TARGET(r10, 0x0, 0x63, 0x0, &(0x7f0000000240)) socketpair(0x4, 0x80000, 0x3c, &(0x7f0000000880)={0xffffffffffffffff}) getsockname(r11, &(0x7f00000008c0)=@hci, &(0x7f0000000940)=0x80) 03:30:14 executing program 0: mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) r4 = geteuid() setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, r4, 0xee01, 0x80, 0x319a}, 0x81, 0x4, 0x0, 0x20, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="a7998db30000000001007e0800000000000000c99b917c38a73d132d86e79a"], 0x1f) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@remote}) r6 = socket(0x10, 0x2, 0x0) write$P9_RREADLINK(r5, &(0x7f00000002c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_PARM(r7, 0xc0cc5615, &(0x7f0000000000)={0x4}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000240)={0x8001007, 0x1}) getsockname$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 03:30:14 executing program 1: mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) r4 = geteuid() setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, r4, 0xee01, 0x80, 0x319a}, 0x81, 0x4, 0x0, 0x20, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="a7998db30000000001007e0800000000000000c99b917c38a73d132d86e79a"], 0x1f) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@remote}) r6 = socket(0x10, 0x2, 0x0) write$P9_RREADLINK(r5, &(0x7f00000002c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_PARM(r7, 0xc0cc5615, &(0x7f0000000000)={0x4}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000240)={0x8001007, 0x1}) getsockname$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 03:30:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:14 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r0 = getpid() prlimit64(0x0, 0xe, &(0x7f0000000280)={0x5, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x3f, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x80, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x4215, 0x0, 0x4, 0x0, 0x0, 0x104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) pipe(&(0x7f0000000300)) close(0xffffffffffffffff) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x30401, 0x0) connect$inet(r4, 0x0, 0xfc60) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='o/k\x8dm\x00\x03\x00', 0x2001, 0x0) ppoll(&(0x7f0000000780)=[{}, {0xffffffffffffffff, 0x13}], 0x2, 0x0, 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000c18000)="ad56b6", 0x3) accept4(0xffffffffffffffff, &(0x7f0000000340)=@pppoe={0x18, 0x0, {0x0, @broadcast}}, &(0x7f00000005c0)=0x80, 0x2c0f134d13d1f0d1) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cuse\x00', 0x82, 0x0) ppoll(&(0x7f0000000780)=[{}, {r5, 0x13}], 0x2, 0x0, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYRESOCT, @ANYRES64=r0, @ANYPTR, @ANYRES64, @ANYRES16=0x0, @ANYRESHEX], 0x43) dup(0xffffffffffffffff) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20001, 0x0) 03:30:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x3, 0x200) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0x5a, &(0x7f0000000280)="8be3f5f2c670fa20cba77196273c1f4eff284f98b4e4eeff8045abee6030fbd52f1fbdeeb060deb23f8a1a127e35300676af118a82e6b676ff2d3560e5ddc5940e1ad86715f0625c9e128051ed82b3a1b7b7bc3b181fcd9d782c"}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x10, 0x3, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000012c0), 0x0, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="6b83ce90b3fd082713026c7e932cb652b0212fa2629a4e1f23fff5dc91429c0a8283b201bfe9529d080e39b3cc8cb956014a0824ced0c8600e716625cbd7c65507a52be7d542a0ed71684c8d5a2f64e6516555d4b45706337286cc2d6b5ad9811e6a3a731b87241a07c4e42c689d25974211802acc5dc8f4c0edd188", 0x7c, 0x0) keyctl$revoke(0x3, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xb0000202) r4 = accept(r1, 0x0, 0x0) write(r3, &(0x7f0000000100), 0x1ede5) shutdown(r3, 0x2) sendto$packet(r4, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:30:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:14 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:14 executing program 1: mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) r4 = geteuid() setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, r4, 0xee01, 0x80, 0x319a}, 0x81, 0x4, 0x0, 0x20, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="a7998db30000000001007e0800000000000000c99b917c38a73d132d86e79a"], 0x1f) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@remote}) r6 = socket(0x10, 0x2, 0x0) write$P9_RREADLINK(r5, &(0x7f00000002c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_PARM(r7, 0xc0cc5615, &(0x7f0000000000)={0x4}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000240)={0x8001007, 0x1}) getsockname$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 284.703070][ T9646] __nla_validate_parse: 5 callbacks suppressed [ 284.703083][ T9646] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x3, 0x200) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0x5a, &(0x7f0000000280)="8be3f5f2c670fa20cba77196273c1f4eff284f98b4e4eeff8045abee6030fbd52f1fbdeeb060deb23f8a1a127e35300676af118a82e6b676ff2d3560e5ddc5940e1ad86715f0625c9e128051ed82b3a1b7b7bc3b181fcd9d782c"}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x10, 0x3, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000012c0), 0x0, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="6b83ce90b3fd082713026c7e932cb652b0212fa2629a4e1f23fff5dc91429c0a8283b201bfe9529d080e39b3cc8cb956014a0824ced0c8600e716625cbd7c65507a52be7d542a0ed71684c8d5a2f64e6516555d4b45706337286cc2d6b5ad9811e6a3a731b87241a07c4e42c689d25974211802acc5dc8f4c0edd188", 0x7c, 0x0) keyctl$revoke(0x3, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xb0000202) r4 = accept(r1, 0x0, 0x0) write(r3, &(0x7f0000000100), 0x1ede5) shutdown(r3, 0x2) sendto$packet(r4, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:30:15 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 284.874349][ T9631] input: syz1 as /devices/virtual/input/input7 03:30:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x3, 0x200) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0x5a, &(0x7f0000000280)="8be3f5f2c670fa20cba77196273c1f4eff284f98b4e4eeff8045abee6030fbd52f1fbdeeb060deb23f8a1a127e35300676af118a82e6b676ff2d3560e5ddc5940e1ad86715f0625c9e128051ed82b3a1b7b7bc3b181fcd9d782c"}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x10, 0x3, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000012c0), 0x0, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="6b83ce90b3fd082713026c7e932cb652b0212fa2629a4e1f23fff5dc91429c0a8283b201bfe9529d080e39b3cc8cb956014a0824ced0c8600e716625cbd7c65507a52be7d542a0ed71684c8d5a2f64e6516555d4b45706337286cc2d6b5ad9811e6a3a731b87241a07c4e42c689d25974211802acc5dc8f4c0edd188", 0x7c, 0x0) keyctl$revoke(0x3, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xb0000202) r4 = accept(r1, 0x0, 0x0) write(r3, &(0x7f0000000100), 0x1ede5) shutdown(r3, 0x2) sendto$packet(r4, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 285.033843][ T9659] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x3, 0x200) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0x5a, &(0x7f0000000280)="8be3f5f2c670fa20cba77196273c1f4eff284f98b4e4eeff8045abee6030fbd52f1fbdeeb060deb23f8a1a127e35300676af118a82e6b676ff2d3560e5ddc5940e1ad86715f0625c9e128051ed82b3a1b7b7bc3b181fcd9d782c"}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x10, 0x3, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000012c0), 0x0, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="6b83ce90b3fd082713026c7e932cb652b0212fa2629a4e1f23fff5dc91429c0a8283b201bfe9529d080e39b3cc8cb956014a0824ced0c8600e716625cbd7c65507a52be7d542a0ed71684c8d5a2f64e6516555d4b45706337286cc2d6b5ad9811e6a3a731b87241a07c4e42c689d25974211802acc5dc8f4c0edd188", 0x7c, 0x0) keyctl$revoke(0x3, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xb0000202) r4 = accept(r1, 0x0, 0x0) write(r3, &(0x7f0000000100), 0x1ede5) shutdown(r3, 0x2) sendto$packet(r4, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:30:16 executing program 1: mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setresuid(0x0, r3, 0x0) r4 = geteuid() setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, r4, 0xee01, 0x80, 0x319a}, 0x81, 0x4, 0x0, 0x20, 0x0, 0x0, 0x200}) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="a7998db30000000001007e0800000000000000c99b917c38a73d132d86e79a"], 0x1f) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@remote}) r6 = socket(0x10, 0x2, 0x0) write$P9_RREADLINK(r5, &(0x7f00000002c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$VIDIOC_G_PARM(r7, 0xc0cc5615, &(0x7f0000000000)={0x4}) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000240)={0x8001007, 0x1}) getsockname$packet(r6, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 03:30:16 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x3, 0x200) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0x5a, &(0x7f0000000280)="8be3f5f2c670fa20cba77196273c1f4eff284f98b4e4eeff8045abee6030fbd52f1fbdeeb060deb23f8a1a127e35300676af118a82e6b676ff2d3560e5ddc5940e1ad86715f0625c9e128051ed82b3a1b7b7bc3b181fcd9d782c"}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x10, 0x3, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000012c0), 0x0, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="6b83ce90b3fd082713026c7e932cb652b0212fa2629a4e1f23fff5dc91429c0a8283b201bfe9529d080e39b3cc8cb956014a0824ced0c8600e716625cbd7c65507a52be7d542a0ed71684c8d5a2f64e6516555d4b45706337286cc2d6b5ad9811e6a3a731b87241a07c4e42c689d25974211802acc5dc8f4c0edd188", 0x7c, 0x0) keyctl$revoke(0x3, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xb0000202) r4 = accept(r1, 0x0, 0x0) write(r3, &(0x7f0000000100), 0x1ede5) shutdown(r3, 0x2) sendto$packet(r4, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:30:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x3, 0x200) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0x5a, &(0x7f0000000280)="8be3f5f2c670fa20cba77196273c1f4eff284f98b4e4eeff8045abee6030fbd52f1fbdeeb060deb23f8a1a127e35300676af118a82e6b676ff2d3560e5ddc5940e1ad86715f0625c9e128051ed82b3a1b7b7bc3b181fcd9d782c"}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x10, 0x3, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000012c0), 0x0, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="6b83ce90b3fd082713026c7e932cb652b0212fa2629a4e1f23fff5dc91429c0a8283b201bfe9529d080e39b3cc8cb956014a0824ced0c8600e716625cbd7c65507a52be7d542a0ed71684c8d5a2f64e6516555d4b45706337286cc2d6b5ad9811e6a3a731b87241a07c4e42c689d25974211802acc5dc8f4c0edd188", 0x7c, 0x0) keyctl$revoke(0x3, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xb0000202) r4 = accept(r1, 0x0, 0x0) write(r3, &(0x7f0000000100), 0x1ede5) shutdown(r3, 0x2) sendto$packet(r4, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:30:16 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2001, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0, 0x13}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0xb0ab5efcdec0379) sendto$inet6(r0, &(0x7f0000000980)="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", 0xfb, 0x40000, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r1, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0xfffffffdfffffffd, 0x41363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x80805, 0x0) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={r5, 0x7ff, 0x420}, 0x8) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) r7 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x10, &(0x7f0000000440)={r8}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000080)={r8, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)={r8, 0xf2, "ce997cc1ea9455d43442e9a24b7f31e930d785a549a3311b965a68522a0e824f80c2b4a849d50b1b95084ca735046665a35ff5f045ab65f90747a3c7dfe8604c5910d9ff3f76c5bb248d9f6ebb4a9162506eb2509ac2a2e33c92d4264da739901b1216c042c8e3beb7c1c6c9cd96c6af95861bb9a08b0b9e1e640f9e1c55b064d36e565af77e72681162f37e77cfb4ee53940f441ad7856a44e8bef14c6c739a7e882a530c524ea9e84e157f743bd1ae7e282e9b786fe46ace41d7c1a622d24a48f865907d2d0654e94db6b367acf2917d3b727df23903a5454d4d414f3dd469f81bfb8b56954d127b0e2bbba16349640abe"}, &(0x7f0000000040)=0xfa) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0) write$uinput_user_dev(r9, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}, 0x45c) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r9, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r9, 0x5501, 0x0) r10 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r9, r10, 0x0) ioctl$UI_DEV_DESTROY(r10, 0x5502) getsockopt$ARPT_SO_GET_REVISION_TARGET(r10, 0x0, 0x63, 0x0, &(0x7f0000000240)) socketpair(0x4, 0x80000, 0x3c, &(0x7f0000000880)={0xffffffffffffffff}) getsockname(r11, &(0x7f00000008c0)=@hci, &(0x7f0000000940)=0x80) [ 285.792546][ T9683] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:16 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:16 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{0x0, 0x0, 0x0}, 0xfffffffd}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7fffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f00000017c0), 0x1000000000000277, 0x400000000000) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) syz_genetlink_get_family_id$team(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$isdn(r2, &(0x7f0000000080)={0x22, 0x48, 0x40, 0x20, 0x2}, 0x6) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000001900)=0xe8) r3 = socket$inet6(0xa, 0x0, 0x3a) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x3) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_DOORUNLOCK(r5, 0x5381) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r6, 0xc0096616, &(0x7f0000000200)=ANY=[@ANYBLOB="04f109f0422a566f000000"]) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000002240)={&(0x7f0000000000), 0xc, 0x0}, 0x4000000) getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@ax25={{}, [@remote, @rose, @remote, @remote, @bcast, @null, @bcast, @rose]}, 0x0) [ 286.424075][ T9706] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:16 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:16 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x8000000200000005, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000040)={'ifb0\x00', 0x400}) [ 286.859383][ T9723] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:17 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget(0x3, 0x200) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000100)={0x5a, &(0x7f0000000280)="8be3f5f2c670fa20cba77196273c1f4eff284f98b4e4eeff8045abee6030fbd52f1fbdeeb060deb23f8a1a127e35300676af118a82e6b676ff2d3560e5ddc5940e1ad86715f0625c9e128051ed82b3a1b7b7bc3b181fcd9d782c"}) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x10, 0x3, 0x0) add_key$keyring(0x0, &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key$user(0x0, &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000012c0), 0x0, 0x0) r2 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)="6b83ce90b3fd082713026c7e932cb652b0212fa2629a4e1f23fff5dc91429c0a8283b201bfe9529d080e39b3cc8cb956014a0824ced0c8600e716625cbd7c65507a52be7d542a0ed71684c8d5a2f64e6516555d4b45706337286cc2d6b5ad9811e6a3a731b87241a07c4e42c689d25974211802acc5dc8f4c0edd188", 0x7c, 0x0) keyctl$revoke(0x3, r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x70, 0x0, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r1, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xb0000202) r4 = accept(r1, 0x0, 0x0) write(r3, &(0x7f0000000100), 0x1ede5) shutdown(r3, 0x2) sendto$packet(r4, &(0x7f0000000040)='u', 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 287.128077][ T9733] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x2a000400) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ff8000/0x2000)=nil) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) unshare(0x8000400) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x2) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000000c0)=0x999) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:30:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 287.426841][ T9745] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:17 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2001, 0x0) r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={0x0, 0x13}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0xb0ab5efcdec0379) sendto$inet6(r0, &(0x7f0000000980)="e90574522ba22e2054cb0a818458c2b80817ca4c5924171eca39a86f3524bc2babbf75b031514ded978e9c82328bd337f189bb6f365d58375c52f6580f81a746d1d85d267fd511e44e8a1959d8096bc1be386fe13d7209983aae25a18ed81fd7a0d02fc9cbd153292d32c14945ef448065d2f74095268721ccba21a80a44c199ec9732ff7ef5152c3c63492c48c07029e9df3c021563e9c51d2835740d9257387afb8d3f1d3b13487610949ba2fa8552d0467d6caa5fb813db679399261309fad84ccb649c9d565244ca547475c5842bd4737c2923a0a94e7309f12036cf0451ad851cc8e4a06b5fb5473ba482b59571c4f50d3f50068a21e4e68d", 0xfb, 0x40000, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r1, 0x0) r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0xfffffffdfffffffd, 0x41363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x20, 0x0, 0x0, 0x1}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0xa, 0x80805, 0x0) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r5, @in={{0x2, 0x0, @rand_addr=0xac14ffbb}}}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={r5, 0x7ff, 0x420}, 0x8) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) r7 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x10, &(0x7f0000000440)={r8}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000080)={r8, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000a80)={r8, 0xf2, "ce997cc1ea9455d43442e9a24b7f31e930d785a549a3311b965a68522a0e824f80c2b4a849d50b1b95084ca735046665a35ff5f045ab65f90747a3c7dfe8604c5910d9ff3f76c5bb248d9f6ebb4a9162506eb2509ac2a2e33c92d4264da739901b1216c042c8e3beb7c1c6c9cd96c6af95861bb9a08b0b9e1e640f9e1c55b064d36e565af77e72681162f37e77cfb4ee53940f441ad7856a44e8bef14c6c739a7e882a530c524ea9e84e157f743bd1ae7e282e9b786fe46ace41d7c1a622d24a48f865907d2d0654e94db6b367acf2917d3b727df23903a5454d4d414f3dd469f81bfb8b56954d127b0e2bbba16349640abe"}, &(0x7f0000000040)=0xfa) r9 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x4000000000802, 0x0) write$uinput_user_dev(r9, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80]}, 0x45c) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x2) ioctl$UI_SET_RELBIT(r9, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r9, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(r9, 0x5501, 0x0) r10 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) dup3(r9, r10, 0x0) ioctl$UI_DEV_DESTROY(r10, 0x5502) getsockopt$ARPT_SO_GET_REVISION_TARGET(r10, 0x0, 0x63, 0x0, &(0x7f0000000240)) socketpair(0x4, 0x80000, 0x3c, &(0x7f0000000880)={0xffffffffffffffff}) getsockname(r11, &(0x7f00000008c0)=@hci, &(0x7f0000000940)=0x80) 03:30:18 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000803, 0x5f) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/\x00\x00\x00\x00\x00\x02\xc7\xfctun\x00', 0x400000001, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000100)={0x0, @adiantum}) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x1}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f00000001c0)) syz_open_procfs(r4, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, {0x48, 0x2, 0x0, 0x0, 0x476, 0x2, 0xfffe000, 0x2edcd6ad}, {0x2, 0xfffffffffffffff7, 0x1, 0x4}, 0x7fff, 0x6e6bb9, 0x0, 0x0, 0x7}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6=@loopback, 0x3505, 0x1, 0x0, 0x2, 0x1, 0x0, 0x400}}, 0xe8) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x143042, 0x0) ftruncate(r5, 0x200004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r5, 0x0, 0x80001d00c0d0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r6, 0x0) r7 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r7, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmmsg$alg(r7, &(0x7f0000000140), 0x4924b68, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r9, 0x84, 0x6e, &(0x7f0000000100)=[@in6={0xa, 0x0, 0x0, @dev, 0x9}], 0x1c) r10 = socket(0x0, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r10, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x10) sendmmsg$alg(r10, &(0x7f0000000140), 0x4924b68, 0x0) r11 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r11, &(0x7f0000000140), 0x4924b68, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r8, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f0000000340)=0x90) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x10001}}, 0x9, 0x7}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000180)={r12, 0x100, 0x2, [0x1ff, 0x5]}, &(0x7f0000000300)=0xc) socket$nl_netfilter(0x10, 0x3, 0xc) [ 287.947929][ T9753] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:18 executing program 3: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) statx(r2, &(0x7f0000000100)='./file0\x00', 0x0, 0x200, &(0x7f0000000140)) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) init_module(&(0x7f0000000000)='\x00', 0x1, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) r3 = getpid() ptrace(0xffffffffffffffff, r3) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000001100)={&(0x7f0000004540)=""/4096, 0xfffffec8}) r4 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r7, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x600, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_LOCK(r7, 0x4008642a, &(0x7f0000000300)={r9, 0x17}) ioctl$DRM_IOCTL_GET_CTX(r6, 0xc0086423, &(0x7f0000000240)={r9, 0x3}) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x20b) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x0, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/grou)\xf7sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x05\x04##\xa9\xca-\xc3a\xafUvc\x9e\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:30:18 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/Bev/sna\x05\x00\x00\x00t\x00', 0x20, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r2 = getpgrp(0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x3, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setpriority(0x0, r2, 0xffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r4, 0x5421, &(0x7f0000000080)=0x200) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38) sendto$inet6(r4, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r5, 0x5421, &(0x7f0000000080)=0x200) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "18f2c12d334b8585", "26d42e8c9bd1d3bcd247aaf964b4a40f", "fae58d39", "49dae1f073beb88c"}, 0x28) sendto$inet6(r5, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) close(r5) fcntl$dupfd(r4, 0x203, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r3, r6) ioctl$RTC_PLL_SET(r7, 0x40207012, &(0x7f0000000140)={0x6, 0x6, 0x8, 0x5, 0x2, 0x3, 0x6}) socket$isdn(0x22, 0x3, 0x25) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r8 = dup(r6) recvfrom$rxrpc(r8, &(0x7f00000002c0)=""/144, 0x90, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r8, 0xc028564e, &(0x7f00000001c0)={0x2, 0x2, [0x1, 0x0, 0x1000, 0x242, 0x4, 0x3, 0x2, 0x4]}) dup(0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:30:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 288.216643][ T9771] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:18 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:18 executing program 3: [ 288.477422][ T9781] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 288.537311][ T9757] input: syz1 as /devices/virtual/input/input9 03:30:18 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0, 0x0, 0x0, 0xfffffffffffffd50}, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="050000002300330000068908ac14140de00000093c31b47d0510c147885b6e765e30637ec921f605", 0x28}], 0x1, 0x0, 0x0, 0x50}, 0x0) 03:30:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast1, @local, @broadcast}, 0xc) 03:30:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'bond0\x00'}, @IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x5c}}, 0x0) 03:30:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) dup2(r0, r1) 03:30:19 executing program 0: symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 03:30:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:19 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000040842, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) dup2(r0, r1) 03:30:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) getpid() getpid() sched_setscheduler(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffd000/0x2000)=nil}) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, &(0x7f0000000040), 0x4) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:30:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0xd) dup2(r0, r1) 03:30:19 executing program 0: symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000002c0)='./file0\x00') lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000040)='./file0\x00') 03:30:19 executing program 1: r0 = socket(0x8, 0x4000000000000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000005c0)={0x0, 0xe7, &(0x7f0000000580)={&(0x7f0000000340)={0x38, r4, 0x31, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}]}, 0x38}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x70, r4, 0x322, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x9}, 0x8000) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@l2={0x1f, 0x8}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x2}, 0x80, 0x0}}], 0x2, 0x0) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000300)={0xb, 0x80000001, 0x800}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000280)) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000000)={'dummy0\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xb}}}) remap_file_pages(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x8, 0x2000) 03:30:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000007c0)={'vxcan0\x00', 0x0}) connect(r1, &(0x7f0000000740)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x80) sendmsg$can_bcm(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000020000000800000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="00000000020000000000000400000000d044937df9141cd4"], 0x200005c8}}, 0x0) [ 289.620728][ T9861] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 03:30:19 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @link_local, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @dev}}}}, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000080)={0x0, 0x0, 0x8001}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(0xffffffffffffffff, 0x0, 0x20040000) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000400)={0x0, 0x0}) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f0000000940), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 289.677492][ T9861] netlink: 'syz-executor.1': attribute type 7 has an invalid length. 03:30:20 executing program 0: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x1]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000240)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:30:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 289.718781][ T9863] mmap: syz-executor.1 (9863) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 289.802777][ T9868] __nla_validate_parse: 4 callbacks suppressed [ 289.802788][ T9868] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:30:20 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x1d2, &(0x7f0000000140)="0000003f00089cf4bd007e5bc5780800a203944eb7309447a2e79f36d038543a0ff172ea2e59ccf052eac9254423f0ff54e34831390d9dab1fc49e2feffc8a45dbf679d5d07efcd72eb343578c1f8ba4ebb8fa388dc41fe6fd276feeddedeb8e7f416544b3eedaf247c46604cdc98ae16f6ec0f38b9482fde1325cf4b74a03ee65fb29cd102b95255f01e75df5fc629cf6d04cb6a960a866a1dd93e521dd3f45fdd9", 0x0, 0x100, 0xf2ffffff, 0xfffffda0, 0x9, &(0x7f0000000080)="be1c189d63050f090000f00b3068b202f0fb1e4074ef99c4fda4b9bb54fd7143c76eca"}, 0x28) [ 289.864159][ T9863] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 03:30:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 289.913613][ T9863] netlink: 'syz-executor.1': attribute type 7 has an invalid length. [ 289.922244][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 289.940586][ T9878] FAT-fs (loop5): unable to read boot sector 03:30:20 executing program 1: syz_mount_image$iso9660(&(0x7f0000000280)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[{@check_relaxed='check=relaxed'}]}) [ 290.012931][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 290.045709][ T9882] FAT-fs (loop5): unable to read boot sector 03:30:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x1b1, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="18000000230047faffffff80000000000400000204001000b315f8b9206ac3d78578125082f4fcc477cb57f5650731df0212aa77ad43cb41f04b15a9fdd6c1610c621c85fe3e348527b0eeab62cbe98e1a9c4e88d402097f00b7dfe8d8b85b820133ec0e"], 0x18}}, 0x0) socket$kcm(0x2, 0x0, 0x2) socket$inet6_sctp(0xa, 0x0, 0x84) close(r0) 03:30:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 290.083047][ T9893] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 290.132562][ T9891] IPVS: ftp: loaded support on port[0] = 21 03:30:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 290.271090][ T9898] ISOFS: Unable to identify CD-ROM format. 03:30:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 290.443679][ T9918] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 290.448339][ T9898] ISOFS: Unable to identify CD-ROM format. 03:30:20 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket$can_j1939(0x1d, 0x2, 0x7) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff024}, {0x80000006}]}, 0x10) 03:30:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) [ 290.533485][ T9925] FAT-fs (loop1): bogus number of reserved sectors [ 290.541332][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 290.553658][ T9927] FAT-fs (loop5): unable to read boot sector 03:30:20 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 290.586437][ T9925] FAT-fs (loop1): Can't find a valid FAT filesystem 03:30:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 290.688247][ T9934] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 290.722282][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 290.749436][ T9937] FAT-fs (loop5): unable to read boot sector [ 290.827679][ T2506] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 290.857819][ T9943] FAT-fs (loop1): unable to read boot sector [ 291.085718][ T9891] IPVS: ftp: loaded support on port[0] = 21 03:30:21 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x1b1, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB="18000000230047faffffff80000000000400000204001000b315f8b9206ac3d78578125082f4fcc477cb57f5650731df0212aa77ad43cb41f04b15a9fdd6c1610c621c85fe3e348527b0eeab62cbe98e1a9c4e88d402097f00b7dfe8d8b85b820133ec0e"], 0x18}}, 0x0) socket(0x0, 0x0, 0x0) close(r0) 03:30:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x0, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 291.407887][ T9962] IPVS: ftp: loaded support on port[0] = 21 [ 291.460694][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 291.483069][ T9967] FAT-fs (loop1): unable to read boot sector 03:30:21 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) [ 291.503557][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 291.519303][ T9975] FAT-fs (loop5): unable to read boot sector 03:30:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x0, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 291.650574][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 291.670639][ T9982] FAT-fs (loop5): unable to read boot sector 03:30:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) [ 292.177548][T10007] IPVS: ftp: loaded support on port[0] = 21 03:30:22 executing program 1: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000900)="120000005200e7ef077b1a3fcd00000204a1", 0x12, 0x0, 0x0, 0xfffffffffffffc61) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000000140)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1048}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x7}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x21}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 03:30:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x0, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) 03:30:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 292.389509][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 292.401465][T10014] FAT-fs (loop5): unable to read boot sector 03:30:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:22 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) [ 292.653534][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 292.666308][T10038] FAT-fs (loop5): unable to read boot sector 03:30:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:23 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0800b5055e0bcfe87b2071") r1 = socket(0x42000000015, 0x805, 0x0) getsockopt(r1, 0x114, 0x2714, 0x0, &(0x7f0000000780)) 03:30:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:23 executing program 3: migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:23 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) 03:30:23 executing program 3: migrate_pages(0x0, 0x7, 0x0, 0x0) [ 292.959720][T10054] FAT-fs (loop5): unable to read boot sector 03:30:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x10, 0x80002, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf54", 0x4c}], 0x1}, 0x0) 03:30:23 executing program 1: pipe(&(0x7f00000008c0)) read(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003400)=[{{&(0x7f0000002c40)=@pppol2tpin6, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x7a) 03:30:23 executing program 0: mknod$loop(0x0, 0x6000, 0x1) 03:30:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 293.112202][T10060] IPVS: ftp: loaded support on port[0] = 21 03:30:23 executing program 3: migrate_pages(0x0, 0x7, 0x0, 0x0) [ 293.235562][T10075] FAT-fs (loop5): unable to read boot sector 03:30:23 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:23 executing program 0: mknod$loop(0x0, 0x6000, 0x1) 03:30:23 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, 0x0, 0x0) 03:30:23 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:23 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r2, &(0x7f0000005640)=[{{&(0x7f0000000400)={0xa, 0x4e20, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000001e80)={0xa, 0x4e24, 0x0, @mcast1, 0xffffffc1}, 0x1c, 0x0}}], 0x2, 0x0) 03:30:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, 0x0, 0x0) 03:30:24 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_int(r0, 0x29, 0x2, 0x0, 0x1b3) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 03:30:24 executing program 0: mknod$loop(0x0, 0x6000, 0x1) 03:30:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:24 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) [ 293.873159][T10101] IPVS: ftp: loaded support on port[0] = 21 03:30:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:24 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:24 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) 03:30:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, 0x0, 0x0) 03:30:24 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:24 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:24 executing program 1: socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f00000003c0)=ANY=[@ANYBLOB="0000000000a2f419e16539ff0c894b37b8a4f93a44d9e0f0c611ca90fd00000000000000d0aa278bb21887db463f4ffd23f2805c537490a79cf5af54bf19039821f1a67f08dadcefb5ea47ebb1f36d604260a39143e7f3f52a792ab5d338fc9efa784457e1a87db1fa8d90ed2a33cb84f5e51ed49d2504b5a1dbde6aa66a3d8eda48d836411172c528872391afb4bdb28785c64691f62b154bfaa1b1f05d7813553bbcd5e0fa21c6ee0191920321d9c7f82cc14fcf0eb9f9583aaee98b720db1168c017a24cffd5a2433a60e9966ae80a6"]}, 0x1, 0x0, 0x0, 0x20000004}, 0x84) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x440000) r1 = open(0x0, 0x101002, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0xfffffffffffffd93, &(0x7f0000000640)={&(0x7f0000000080)={0x14}, 0xffffffffffffffce}}, 0x0) fsetxattr$security_evm(0xffffffffffffffff, 0x0, &(0x7f0000000b00)=@v2={0x3, 0x2, 0x3, 0x3}, 0xa, 0x3) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x90, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) r3 = socket$inet6(0xa, 0x80003, 0xff) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000240)={@remote, 0x0}, &(0x7f0000000280)=0x14) setsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000002c0)={r4, @multicast2, @empty}, 0xc) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000340)=""/108) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x2) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000140)=0x4) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac05e11}) 03:30:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 03:30:25 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) 03:30:25 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 294.810729][T10146] IPVS: ftp: loaded support on port[0] = 21 03:30:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:25 executing program 1: [ 294.992918][ T2507] print_req_error: 2 callbacks suppressed [ 294.992934][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 295.006668][T10160] FAT-fs (loop5): unable to read boot sector 03:30:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:25 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 03:30:25 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) 03:30:25 executing program 2: mknod$loop(0x0, 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:25 executing program 1: 03:30:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:25 executing program 2: mknod$loop(0x0, 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:25 executing program 1: 03:30:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 295.721262][T10186] IPVS: ftp: loaded support on port[0] = 21 03:30:26 executing program 0: 03:30:26 executing program 2: mknod$loop(0x0, 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:26 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:26 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:26 executing program 1: 03:30:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 03:30:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:26 executing program 0: 03:30:26 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:26 executing program 0: 03:30:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 03:30:26 executing program 1: 03:30:26 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) [ 296.596999][T10229] IPVS: ftp: loaded support on port[0] = 21 03:30:27 executing program 0: 03:30:27 executing program 1: 03:30:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 03:30:27 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:27 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:27 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:27 executing program 0: 03:30:27 executing program 1: [ 297.146185][T10259] IPVS: ftp: loaded support on port[0] = 21 03:30:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) 03:30:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 03:30:27 executing program 0: 03:30:27 executing program 1: 03:30:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 03:30:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 297.428293][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 297.454991][T10268] FAT-fs (loop5): unable to read boot sector 03:30:27 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:27 executing program 0: [ 297.786723][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 297.808676][T10291] FAT-fs (loop5): unable to read boot sector 03:30:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:28 executing program 1: 03:30:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) 03:30:28 executing program 3: 03:30:28 executing program 0: 03:30:28 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:28 executing program 0: 03:30:28 executing program 3: 03:30:28 executing program 1: 03:30:28 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)}], 0x1}, 0x0) [ 298.118049][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 298.157518][T10306] FAT-fs (loop5): unable to read boot sector [ 298.175189][T10310] IPVS: ftp: loaded support on port[0] = 21 03:30:28 executing program 0: syz_mount_image$vfat(&(0x7f00000003c0)='vfat\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@fat=@usefree='usefree'}]}) 03:30:28 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 298.449892][T10326] FAT-fs (loop0): bogus number of reserved sectors [ 298.519861][T10326] FAT-fs (loop0): Can't find a valid FAT filesystem 03:30:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:29 executing program 1: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)}], 0x1}, 0x0) 03:30:29 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)}], 0x1}, 0x0) [ 298.856380][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 298.877844][T10346] FAT-fs (loop1): unable to read boot sector 03:30:29 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 298.908659][T10354] IPVS: ftp: loaded support on port[0] = 21 [ 298.960233][ T2506] blk_update_request: I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 298.975139][T10345] FAT-fs (loop3): unable to read boot sector 03:30:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e2800", 0x26}], 0x1}, 0x0) 03:30:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 299.049247][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 299.061942][T10363] FAT-fs (loop1): unable to read boot sector 03:30:29 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/Bev/sna\x05\x00\x00\x00t\x00', 0x20, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r2 = getpgrp(0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x3, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setpriority(0x0, r2, 0xffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r4, 0x5421, &(0x7f0000000080)=0x200) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38) sendto$inet6(r4, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r5, 0x5421, &(0x7f0000000080)=0x200) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "18f2c12d334b8585", "26d42e8c9bd1d3bcd247aaf964b4a40f", "fae58d39", "49dae1f073beb88c"}, 0x28) sendto$inet6(r5, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) close(r5) fcntl$dupfd(r4, 0x203, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r3, r6) ioctl$RTC_PLL_SET(r7, 0x40207012, &(0x7f0000000140)={0x6, 0x6, 0x8, 0x5, 0x2, 0x3, 0x6}) socket$isdn(0x22, 0x3, 0x25) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r8 = dup(r6) recvfrom$rxrpc(r8, &(0x7f00000002c0)=""/144, 0x90, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r8, 0xc028564e, &(0x7f00000001c0)={0x2, 0x2, [0x1, 0x0, 0x1000, 0x242, 0x4, 0x3, 0x2, 0x4]}) dup(0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 299.246621][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 299.258259][T10374] FAT-fs (loop1): unable to read boot sector 03:30:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:29 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], 0x0, &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 299.480638][T10387] IPVS: ftp: loaded support on port[0] = 21 03:30:29 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) socket$inet_udp(0x2, 0x2, 0x0) 03:30:29 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e2800", 0x26}], 0x1}, 0x0) 03:30:29 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], 0x0, &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:29 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:29 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) sched_setaffinity(0x0, 0x2fb, &(0x7f00000008c0)=0xa010000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/Bev/sna\x05\x00\x00\x00t\x00', 0x20, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r2 = getpgrp(0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000005c0)={0x0, 0x3, 0x0, 0x20, 0x100000001, 0x0, 0x8}) setpriority(0x0, r2, 0xffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000000), &(0x7f0000000040)=0xc) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r4, 0x5421, &(0x7f0000000080)=0x200) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_256={{0x303}, "b299b3e4468a9208", "b8d5e8382b7cb1d02b30a05c6ef0b81f0920126148d3f0d32c95b2b7a139c441", "64f9a123", "b1034b903a64f865"}, 0x38) sendto$inet6(r4, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000640)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x1, 0x0, "0c77bded7125338de47145b71f2226c0b6910f8370be1e52d9e6d13509bb602e4818224696dafe09c25ed1d5e17a4c19b884282e4f743e00c7a3eff599b13d518d1000"}, 0xd8) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$int_in(r5, 0x5421, &(0x7f0000000080)=0x200) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "18f2c12d334b8585", "26d42e8c9bd1d3bcd247aaf964b4a40f", "fae58d39", "49dae1f073beb88c"}, 0x28) sendto$inet6(r5, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) close(r5) fcntl$dupfd(r4, 0x203, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r3, r6) ioctl$RTC_PLL_SET(r7, 0x40207012, &(0x7f0000000140)={0x6, 0x6, 0x8, 0x5, 0x2, 0x3, 0x6}) socket$isdn(0x22, 0x3, 0x25) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r8 = dup(r6) recvfrom$rxrpc(r8, &(0x7f00000002c0)=""/144, 0x90, 0x0, 0x0, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r8, 0xc028564e, &(0x7f00000001c0)={0x2, 0x2, [0x1, 0x0, 0x1000, 0x242, 0x4, 0x3, 0x2, 0x4]}) dup(0xffffffffffffffff) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:30:30 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], 0x0, &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e2800", 0x26}], 0x1}, 0x0) [ 299.732159][T10399] IPVS: ftp: loaded support on port[0] = 21 03:30:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(0x0) 03:30:30 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 03:30:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:30:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012", 0x39}], 0x1}, 0x0) 03:30:30 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:30 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:30 executing program 1: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) statx(r2, &(0x7f0000000100)='./file0\x00', 0x0, 0x200, &(0x7f0000000140)) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) init_module(&(0x7f0000000000)='\x00', 0x1, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) r3 = getpid() ptrace(0xffffffffffffffff, r3) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000001100)={&(0x7f0000004540)=""/4096, 0xfffffec8}) r4 = socket$packet(0x11, 0x2, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r7, 0xc06864a2, &(0x7f0000000000)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x600, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "07a30cd41929926a9335701c068b17b9fc07cd039f5a47009833063800"}}) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_ADD_CTX(r8, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_LOCK(r7, 0x4008642a, &(0x7f0000000300)={r9, 0x17}) ioctl$DRM_IOCTL_GET_CTX(r6, 0xc0086423, &(0x7f0000000240)={r9, 0x3}) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x20b) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setresgid(0x0, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x0, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='/grou)\xf7sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x05\x04##\xa9\xca-\xc3a\xafUvc\x9e\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:30:30 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 03:30:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) 03:30:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012", 0x39}], 0x1}, 0x0) 03:30:30 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 03:30:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012", 0x39}], 0x1}, 0x0) 03:30:31 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) 03:30:31 executing program 2 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 03:30:31 executing program 0: mknod$loop(0x0, 0x6000, 0x1) 03:30:31 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 03:30:31 executing program 1 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:31 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:31 executing program 0: mknod$loop(0x0, 0x6000, 0x1) 03:30:31 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:31 executing program 0: mknod$loop(0x0, 0x6000, 0x1) 03:30:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d82", 0x43}], 0x1}, 0x0) 03:30:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:32 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 03:30:32 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) [ 301.791572][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 301.803003][T10509] FAT-fs (loop5): unable to read boot sector [ 301.884654][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 301.897996][T10509] FAT-fs (loop5): unable to read boot sector 03:30:32 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, &(0x7f00000000c0)={{0x1, 0x0, 0x175d4298, 0x1, 0x40}, 0x7, 0xfffffffffffffffc}) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 03:30:32 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80040, 0x0) getsockname$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="7c84c1fb0f4537182d3868961a94c64db905068a8b6e5a0bba34eec872c668be9f5837cd676c8c2605813acf0f267f8c76c13c8a9845155a98703a677b90", 0x3e, 0x8}], 0x80000, &(0x7f0000000240)={[{@unhide='unhide'}, {@norock='norock'}, {@nojoliet='nojoliet'}, {@unhide='unhide'}, {@block={'block', 0x3d, 0x200}}, {@check_strict='check=strict'}], [{@uid_gt={'uid>', r2}}, {@permit_directio='permit_directio'}]}) 03:30:32 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) 03:30:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:32 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) 03:30:32 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e23", 0x48}], 0x1}, 0x0) 03:30:32 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3, 0x4800) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) pwrite64(r3, &(0x7f0000003a80)="5718765a3e417f73563c14c00513c6884f609947226024ad5d051f2058e3f79d7224b540767f433c784ca70c2d4da9ace173f1e20b4db8b1e38b3ff03eb98feddfde8d6f7bbc2a04ce92e90fe214601755f3d54fe58fcbe482a4afd56d5cb4559eda4940db324ff7b15b08dda48e18a6aef8a98a818db037299fe6fa0c922453b86de9c83ddd98e3b330427d382a5db66cc7e9955d37aa8cac7c3fe632ae21c1bd1df3b5981b44d94ee2cdf57a13aa3704f7b1d8011802d4c0cadca4221d991152b66a77ab65ef7ae2cc0c9d", 0xcc, 0x7ff) r4 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setresgid(0x0, r5, 0x0) fchownat(r0, &(0x7f0000000080)='./file0\x00', r2, r5, 0xa00) r6 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r1, &(0x7f00000038c0)=[{{&(0x7f0000000140)=@nfc_llcp={0x27, 0x0, 0x1, 0x1, 0x1f, 0x5, "1d9ccb32f6ad6229e4a82010db1d25c62bca9d099d6ae9620f197eef9d8434d9011679d0d8477b247b3466bfd7a4b1fc29d297287e893b93e610814a3aa4f0", 0xd}, 0x80, &(0x7f0000001240)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="e97fdab2083019d583cba6ff4a2edc5cf2291d57fc72cc917058703974cd93fb6d9b5fb02c7250633446038634a1ed3fef8b38d06c1bc3480baaa7b436b6b8d6fe9bc8b7811fe1034c712cb7abb2a6936243a0c54d2a358c27f2b56051d0e0a4a40f91ed90e128bef4bfffb3b2090f37ac", 0x71}], 0x2, &(0x7f0000001280)=[@mark={{0x14, 0x1, 0x24, 0x6da4}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14}}, @mark={{0x14, 0x1, 0x24, 0xfffeffff}}, @timestamping={{0x14, 0x1, 0x25, 0x7fffffff}}], 0x78}}, {{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001300)="214aab2c9f74c857fd129d6bd6cf37f431d597e877f6ee8dda10c1fdf8ad194cc739192c5df6ee4f5843ae0af91a7b799c3a62d9e54f73811fdf654c6c69da718a392462f0117e4e3ef6265181a14b54f04e26abe376ccbb0ee4d93d917d9895181857154db3a97d4dc329b74cec3cc4ed5dafd31e63d0ea50c359fd8a4ed22294d7e1be77f30ac522c9ec6ea6ca980bfdd3caaa9456880ff045fa42b947662c40", 0xa1}, {&(0x7f00000013c0)="c65fd27e10862c80892e3cbff1b62269f4def37a9cab820cca9b180641d0f2f0ddbffa8fb8c72d1d5c86741459ea4a2c1c3da535e959ce2930d9d2372bb15fc854918ead20d0c5af73f84d0ae45c4acf0070bb9382f2d8ed672c7c779e14d314cb04d698fed2d73045bb9a286d90bcc2", 0x70}, {&(0x7f0000001440)="673e56e9c05f2245ff65cead3a0c1e64a80f45120f1ff41024a56e9fadf32e1c69cb6c6211620d42bc32f2706fc2837d0e35dc177ca21ce3095a36911d1f3598347bd21a8c6b4b97a89e36c20f5b6c2cc1e102739f6b009a2e2cd0a3af501f63b08efe43537aed14c508b93fdd946ff4e44c6ea47423c6cf429d0c6454d486c8bac6a1a9ee413b394109557ffe5b6c17296c3920c12945effb2e84bf583d0c546cec0b4806882ea07f3652280be9ce91fbabb58006d7719b63341e2c", 0xbc}, {&(0x7f0000001500)="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", 0xfa}, {&(0x7f0000001600)="466fb9b8e1bf04b20b54aa932f3a16dda3d824bf3ac0eff4ff670ed9bdbcab977a0f4f8bde17", 0x26}], 0x5, &(0x7f00000016c0)=[@timestamping={{0x14, 0x1, 0x25, 0x80}}, @timestamping={{0x14, 0x1, 0x25, 0x20}}, @timestamping={{0x14, 0x1, 0x25, 0x80000001}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}], 0x60}}, {{&(0x7f0000001740)=@in={0x2, 0x4e21, @broadcast}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000017c0)="ebf051bb86960e76d6447a529e77f4a4a6178f45b7529601a9683d59ecce5b7477ea81da54ca73239238957c6aaae66e1c0651cd01b172ebbb148f6683ab3e1a5438389e3c226a2a9510c890fe4f4fcbec30d99c13a2a1a6962b702b586af20a4ce4b220605daaf2d007f3ef2fc2a83928564e6b4ab0b199a36fda55a8a91527f0db", 0x82}, {&(0x7f0000001880)="c00792900ce08e8bfe874fd8cb795e7627362f5f523f5cd0a2e9092882e5e2b2d8f107d7b736eb2c6e9717a0", 0x2c}, {&(0x7f00000018c0)="830789fa461cc3bab6649e05506478d5d124ec313c9f6bb12aa0df86dc69dd363ba050e3133caaf3e62679f8173763a6bb39d18f256ba2c6c30392f7", 0x3c}, {&(0x7f0000001900)="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", 0xfb}, {&(0x7f0000001a00)="8ee9a1689541e515bf78adad4ca5c30c4160eeb2c32cf2f617a85ea8ae9a19f32b758ff1c48c14e420cad873404809edfc44f5d763033b9bfa350b925a6a5f", 0x3f}, {&(0x7f0000001a40)="65d6dab905b9a45066b6f1c24a1abd33b972cf9e8917c5eba85e8a56d1ce42d3ec27f90ad3b765e94139cecfbbf2a06ebef2a8cee4a7f31d1012435e42b0c148c6ab92eb431258f5727e352188025f8e94fbfdc325d14ec96a8d2a890adcf05c2d35d8821107a3a4715a3adf80b068e999d809155a6b61833cc1c5e381fe42b3cf78a35d86dfd6a9e4b099d5f59f5f494f8f11f10a6041c4e89fd3d553e1a414fa87e4835bf83f2fea99d7ce693ee56aa116da9c0e74d33a80cf8d4e805ced2e0a94f9fa2932537070c20419750b24719b7a599c199c4caaa5", 0xd9}], 0x6, &(0x7f0000001bc0)=[@mark={{0x14, 0x1, 0x24, 0x2}}], 0x18}}, {{&(0x7f0000001c00)=@pppoe={0x18, 0x0, {0x0, @empty, 'ip6tnl0\x00'}}, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001c80)="c8b44fd2f47853c72472cb337f962746167746ed1c320c528297a200949fa86ade705b6b136a49e9401515ab045888df8feb06b4e161b87ad03b0989044902c84df9b7b46a4f82ccd8008068f7047198319fa336eb9c5adf3ca5cbc1c2df050105ddc9e8dcc1475a7a19bd3b8394493183ea524e10fd75c35b1d08a0bc120f74b275528b76be2a3c2e33e8c383f2e66d8e25ddfcd3f65e5e15830d9cafb9124d782265868290c1b1b2a9df8fd2ef22aaaa56612408048da973e20d277b91ddd79899e7ee2bafc54efeb39b9b0a8cdc353502b146b198635bb79619c330c184ad60a7be99173b6bbfc59ffa57d99ab5b2eaed5529d5", 0xf5}, {&(0x7f0000001d80)="b9efe74cb0cdaec5234d51a893063ba96af7f2c2d5513145e974a920d7f220e43af40738f64b6007592b1766082b7f9491108144692ae18d809ee9091860100cf68275045dc8857ad5a694655d8ffbd16dfcb0997bc9d517ad6dc38f28ab978bbad54476405a08ac342cd5aec84507ba1e977f31979d980abaa92e309fcd849274374c76ad5233d24948d6fbac9a5447929ef0f5c8b61ce22b185f93c4458ee52fcfa1a6b52bc1ca148142ed0e1655a00fd7cbd34841a45660d018d804b8b249b31137748acfb3487bf820ccb2328e", 0xcf}, {&(0x7f0000001e80)="3e3a5c5314efde3c3e5949668f45fe669c347414a136a19786ed08767ce559fa49e83bd41f0b8d3651a249b011605e25e849e7eb8cbf122cb23ec9a9159bb05e04e1d4945109bd637c3b426bd5a4e7506194d9afee40babdaf29f06440a040282311cd", 0x63}, {&(0x7f0000001f00)="39ac9c87280c44f5a0b6821dbec2c7fa2acc498e255cc456436b0058fa9986f88a8e78f328a443e64fd9fef74d59be9dcbfd3fb7087b72bbfe8508c40c67a11f247a1af1e1d5988952c19713d13f07777a1615429be9b7c5a88ae350cf3531c2be50fdb75c641425829b27f43eca7f6adce2ccc9e2461267e6b03899ab27c4f369b8b82e8a69f69146", 0x89}], 0x4, &(0x7f0000002000)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x18}}, {{&(0x7f0000002040)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000002200)=[{&(0x7f00000020c0)="6431c7b41873a2be78e72a1f275a812f5c7e9359e466d592686696f8a24e22972df3bcd4330b61c30a3eb5bb39099536167351ba435653887dbe857f73b16be9a3a551a8eb07b9d35782ec6c20b5e523426c0360c253bff73659eb53d3529ea631f845b3c393cb0a949a0e5bb77475b1e880f51fcf6d2b7e462bb8b026a85eaa45dc370bf9634daedd419cd3487f9fa812741e16aa2860adb005beff0f6c6efa4a3be0221d606a2a9ad305003eb2cc8815641f2da2abf5ad471d8e401854b0076952b55a4757", 0xc6}, {&(0x7f00000021c0)="3335a3bd13e22cd7a072f5757ad1cc3c2a2678f4b3d4f9203f67817491231529c6", 0x21}], 0x2, &(0x7f0000002240)=[@txtime={{0x18, 0x1, 0x3d, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0xffffff00}}], 0x30}}, {{&(0x7f0000002280)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000034c0)=[{&(0x7f0000002300)="dfc4c48bfaa659d28d198ee04be82496b19f6ca26f3907e469343adf3946a5826845cbc08ce55515d542b2408aec52112e374004ecd2eed9ebbcf9e2d387a14a25e2fe9b0e7b4cb83af4b76080c2ec87bbc85a0bd73f3818f280422728f25e2cdc829b8f64d4f42a2f7de3f546443388de9abfbec8e408dcdc4a0c8c4578b21b0dc2177a76cf0834ff3fd6758237bf5965c19e0e7beac8a0d5d3178cf055f6a8a6e6c3092e62550ae01cf0c4c305acf7545ef3458a67013919477689d99f4d3a95e145defe8b3e855c1f2b82fc7cb0ad2917587b71e736cf5245ef33df95d3f8743a3148560d1a76d6c0dadd6e32c2d21469a5", 0xf3}, {&(0x7f0000002400)="e386104700b62f3efe659b7bc02657e043f223b09ac19731d52bd6ac8ea7d20c0e3f82c6b3390710dc8e4e69cef60b66cb4ebf01c2ed2c7cf0d9ac2139660d9e12b88522fdbb148c2284df7567092ce2bca468efb8474d9a4e057bec96160eb139c59f6413debb02f149064e213e72acd1a17f8979e4764a8a", 0x79}, {&(0x7f0000002480)}, {&(0x7f00000024c0)="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", 0x1000}], 0x4, &(0x7f0000003500)=[@txtime={{0x18, 0x1, 0x3d, 0x8b19}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xfffffff9}}, @mark={{0x14, 0x1, 0x24, 0x7}}], 0x60}}, {{&(0x7f0000003580)=@pppol2tpv3in6={0x18, 0x1, {0x0, r6, 0x1, 0x0, 0x4, 0x1, {0xa, 0x4e21, 0x9, @rand_addr="5521c8eebdd45261ebe6d322dde6f643", 0x20}}}, 0x80, &(0x7f00000037c0)=[{&(0x7f0000003600)="12142d05dbc5f7e820a3e8b9f3b4713ea7ae9d63cdf0513d03b875e9e2068903970181d7727c0ea87cd10663e9a295810c27b0ae1be5d34d81036078d463b506f72e90d364d8502bd610227236b31e8a0fb8bd76f34bbb70785c5ec3e58b38d081b898f3adcb1a26eca3fd95780ca744c564031c713795e5dfc427de24edbffd707bb7c1c6f02c160ecef62194814cb57e70629f6e9f5ea9226c182aed7c4a4fafd8", 0xa2}, {&(0x7f00000036c0)="b384d8", 0x3}, {&(0x7f0000003700)="90f54219a2162cd75b64dc58710d1fecd1a4c6bd8f37c52e9a70b567c0716f4996d7fa57ec92f688e23bfbd8062a8270db11249041d566537ee4956966a88ce5758dd0853fa51c98b10f4cf6f4f90700f7d80a40ece5880fc7865b225bed644ac5ae91ba51bba75a795e79f0b54e3b256855ac293c84b781bc29232097821194acb0dbf20f147a071ea44834a7fd728f8f8cee7d7bbb5cf48535168124c276b6363652c60971569dfd7b4a7873", 0xad}], 0x3, &(0x7f0000003800)=[@txtime={{0x18, 0x1, 0x3d, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0xb8b}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x3ff}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x4}}], 0xa8}}], 0x7, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffffff, &(0x7f0000003b80)) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:32 executing program 1: r0 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x1, 0x4202) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x0, 0x0, 0xd7, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/215}, &(0x7f0000000480)=0x78) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f00000001c0)={0x7f, 0xa}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='\x00wUH\x00', 0x20403, 0x0) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f00000000c0)={0x6, 0x8, 0x2e62}) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000200)='/dev/capi20\x00', 0x800, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$int_out(r3, 0x5461, &(0x7f0000000240)) connect$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x1, 0x2, 0x3, 0xff, "1c59db9581efbb7af123f5b9d0625bd1f017a47e830ddba1d674251690793fc0dbe7c02b2457535da3971f415d3d9bc3535ac76ff708a6e4b5820d0cebbf5a", 0xa}, 0x60) 03:30:32 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:32 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000", 0x4a}], 0x1}, 0x0) 03:30:33 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 302.801640][ T2506] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 302.824225][T10550] FAT-fs (loop1): unable to read boot sector 03:30:33 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x3d, &(0x7f0000000040)=""/30, &(0x7f0000000080)=0x1e) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:33 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000", 0x4a}], 0x1}, 0x0) [ 303.050348][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 303.063780][T10574] FAT-fs (loop1): unable to read boot sector [ 303.089152][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 303.114811][T10579] FAT-fs (loop5): unable to read boot sector [ 303.171328][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 303.193747][T10580] FAT-fs (loop5): unable to read boot sector 03:30:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:33 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:33 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3ea, 0x40, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10061, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000000)={0xffffff00, 0x3, 0xa36a, {0x77359400}, 0x2, 0x8001}) 03:30:33 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x100a0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:33 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000", 0x4a}], 0x1}, 0x0) 03:30:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf", 0x4b}], 0x1}, 0x0) [ 303.413365][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 303.423323][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 303.424495][T10602] FAT-fs (loop5): unable to read boot sector [ 303.441060][T10604] FAT-fs (loop1): unable to read boot sector 03:30:33 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:33 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) 03:30:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 303.480863][T10610] IPVS: ftp: loaded support on port[0] = 21 [ 303.508695][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 303.554517][T10614] FAT-fs (loop5): unable to read boot sector 03:30:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf", 0x4b}], 0x1}, 0x0) 03:30:34 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000040)=0x9, 0x4) [ 303.710005][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 303.729083][T10626] FAT-fs (loop1): unable to read boot sector 03:30:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:34 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) 03:30:34 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:34 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)="24000000210007041dfffd946f618981020003e8fe0208010001080008000a000408ff7e280000001100ffffba16b0aa1c8900000000000012000000000000eff24d8238cfa47e230000bf", 0x4b}], 0x1}, 0x0) 03:30:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x8080, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000540)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000006c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000580)={0xd4, r1, 0xc00, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="a938b278d418ccfaa004751d7a3e5626"}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6d81}]}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x40822}, 0x56850155e8090671) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:34 executing program 2: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) wait4(r0, &(0x7f0000000000), 0x20000000, &(0x7f0000000040)) 03:30:34 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:34 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) [ 304.213553][T10650] FAT-fs (loop1): unable to read boot sector 03:30:34 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) 03:30:34 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000040)={0x3f, 0x6, 0x10000, 0x8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) mount(&(0x7f0000000080)=ANY=[@ANYRES64=r1, @ANYPTR64=&(0x7f0000000700)=ANY=[@ANYBLOB="e7045c7747cfac30e82159db51acb7795d93f78e5f7ce997248807e7b58c2ad84db28cec57b2c3e0ea2a60274e9f14e24ef8046d99f4e3b41c7f8655e4750501b0821d8b0bcf7e95cf173a2365ee0aadb229065587a37897cae7402687f9e75f39d2826c18bbc0e9c98cb9371b5442a73bcb7fd97ed44d441111196c90f24a5d9e56561a79c9292318d7df67e2658257513430abdd983de8702f603c486a244db10025c39600774b864ebcef0abb6c9f7411d17078ae174ef6bf48b0df2a", @ANYBLOB="7270eff98f194a0bb36f8aee104bf11cc2f2dde262f0083c885d0b9fbeb98e07af2a66711495b3210ea9f3b63e3ee6861e5e17e7726d42d14343be6de11502504bfcce31f610d2ee159584af70219c991627fad77a96e03c5167da57f477a05d831829ffe9966f0770924881e10693e64ce5a940514de4c8e1fc9511c7419bf733ed44736b0fa7530b4420c92cc0f7e1b966d4825c83136ee9cd6e512dcd0f2c0b08b77e79261aa53eb4a11921ce60fd76e2156be49e0a15c3cae3b94c268c8dac494e06dfc01e44ccefd1a75272016e95144781686a1942c262fd2a99b7a4453b5e4e42aff99f827637ffe31a6e459fbfde9efee4bcc340c426f9d0c91a86665572236b4827325f60403b6c0d9558799c3ef524972158979df2bec33690ffbcf6678860f5febe7042b851da42fd919bd486b5862f0000df0da8ca6462ebb3c6d1b7f488464795e13ecb94d66e3607c630db3bec7698bace29f57a5ddf4ba76aef5a343907b72c91464a4b9fb398ab83", @ANYRESHEX=r1, @ANYRESOCT=r2, @ANYBLOB="d0b655a2c897b4a9ea392836c588bc7af2b758e802ed27c179fe34acc9ef238c78ea061e6a8876389bcee34894374e12aa14999bdc136894f529d77d55d7326f88b18dcd79f59ad354c481c6f3e11f777ae71e137f14d840cf2625a3df6aacc9635660a4b3433257", @ANYRES32, @ANYRES64=r0], @ANYRESDEC=r4, @ANYPTR64=&(0x7f0000000280)=ANY=[@ANYRESDEC, @ANYPTR64, @ANYRESDEC=r0, @ANYRES16=r5, @ANYBLOB="aed4923da3a2110000000051000800f41b7eeb360040005b17", @ANYRESDEC=r4, @ANYRESDEC=r7]], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='m4sdos', 0x858430, 0x0) [ 304.288633][T10660] IPVS: ftp: loaded support on port[0] = 21 03:30:34 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x9, 0x0, 0x0, 0x0, 0x0, 0x6cf752833000662b, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x9, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0x80, 0x5, 0x4, 0x80070000, {0x0, 0x7530}, {0x3, 0x0, 0xa9, 0x0, 0x2, 0x6, "983bd56c"}, 0x200, 0x0, @offset=0x6, 0x4}) [ 304.543723][T10682] FAT-fs (loop1): unable to read boot sector [ 304.564850][T10668] FAT-fs (loop9): unable to read boot sector 03:30:35 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:35 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:35 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:35 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x1, 0x4202) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x0, 0x0, 0xd7, [], 0x2, &(0x7f00000002c0)=[{}, {}], &(0x7f0000000300)=""/215}, &(0x7f0000000480)=0x78) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SIOCX25GCAUSEDIAG(r1, 0x89e6, &(0x7f00000001c0)={0x7f, 0xa}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000004c0)='\x00wUH\x00', 0x20403, 0x0) ioctl$KVM_S390_UCAS_MAP(r2, 0x4018ae50, &(0x7f00000000c0)={0x6, 0x8, 0x2e62}) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000200)='/dev/capi20\x00', 0x800, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r4, 0x6612) ioctl$int_out(r3, 0x5461, &(0x7f0000000240)) connect$nfc_llcp(r2, &(0x7f0000000100)={0x27, 0x0, 0x1, 0x2, 0x3, 0xff, "1c59db9581efbb7af123f5b9d0625bd1f017a47e830ddba1d674251690793fc0dbe7c02b2457535da3971f415d3d9bc3535ac76ff708a6e4b5820d0cebbf5a", 0xa}, 0x60) 03:30:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f00000000c0)=""/240) 03:30:35 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 304.954054][T10703] FAT-fs (loop1): unable to read boot sector 03:30:35 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1, 0x4000) socket$can_raw(0x1d, 0x3, 0x1) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{0xf000, 0x6000, 0x11, 0x81, 0x3f, 0x81, 0x0, 0x7, 0x4, 0x5b, 0xff, 0x1}, {0x4, 0x3000, 0xe, 0x8, 0x1, 0x40, 0x0, 0x0, 0x19, 0x6, 0x81, 0x9}, {0x1, 0x6000, 0xb, 0x4, 0x8, 0x8, 0x5, 0x2, 0xfc, 0x33, 0xb5, 0x4}, {0x2000, 0x4, 0xe, 0x64, 0x4, 0x7, 0x0, 0x0, 0x2, 0x1, 0x4, 0x7}, {0x6000, 0x1, 0x4, 0x9, 0x2, 0x1f, 0xff, 0x0, 0x0, 0x0, 0xfb}, {0x3000, 0x2, 0x4, 0x4, 0x6, 0xc1, 0x3, 0x3, 0xff, 0x39, 0x20, 0x1}, {0x55119740c66dfa12, 0x2, 0x3, 0x5, 0x2, 0x3, 0x81, 0x8, 0x40, 0x80, 0x3}, {0x0, 0x4, 0x3, 0x8, 0x7f, 0x21, 0xac, 0x27, 0x4, 0x8, 0x55, 0x20}, {0x1002, 0x100000}, {0x9ada0bc65cfa0ff5}, 0x30, 0x0, 0x0, 0x7e110a7133d0bee0, 0xe, 0x4000, 0x4, [0x2, 0x20, 0x2, 0x6]}) [ 305.125753][T10714] IPVS: ftp: loaded support on port[0] = 21 03:30:35 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 305.250421][T10723] FAT-fs (loop1): unable to read boot sector 03:30:35 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 305.354578][T10734] FAT-fs (loop9): unable to read boot sector 03:30:35 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 305.559793][T10741] FAT-fs (loop1): unable to read boot sector [ 305.598699][T10742] FAT-fs (loop9): unable to read boot sector 03:30:36 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:36 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:36 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r8 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r8, 0x6, &(0x7f00000004c0)=""/142) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 306.157418][T10755] FAT-fs (loop9): unable to read boot sector 03:30:36 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:36 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) r7 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r7, 0x6, &(0x7f00000004c0)=""/142) 03:30:36 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:36 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 306.421854][T10773] FAT-fs (loop9): unable to read boot sector [ 306.439268][T10775] FAT-fs (loop1): unable to read boot sector [ 306.632588][T10785] FAT-fs (loop1): unable to read boot sector 03:30:46 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x600) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f00000000c0)={'teql0\x00', 0x3}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000100)='locgroupeth0lo,\x00') migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:46 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:46 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:46 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) r7 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r7, 0x6, &(0x7f00000004c0)=""/142) 03:30:46 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:46 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/3\x00\xc9\xc9\xec\x80\xe3\xd7\x19)aF>\x11\x9ed\xa4IWj\xd4$,\x86\xf9\xa0r\x02A>\xb4p\xb0\xbe\xcf0\xb6\xaa\xc1\x00\x02\x9e\x9b\".O=\xf3\x86r\xffp\xcf\x93Z\xf5\xfe{\xd9L\x92\xc3\x1a\xafx\xd1s\xe4$\xf1\xd7\xc4V\x05\xb4\x8d\x86~\xed\xa1\x84W\x1d\t\x00\x00\x00\t\xb1]\x01\xf6\xfe\x0eP\xcex\xc6h\x16\x81\xb1\rO\f\xb0\xdd\x92b\x00\xacAp4\x93\xf02\xba\xe7\xed\xaeG\x1dL\xd8\x91/\xc5L\xc57\x94\xb4\xf6;\xb6\"b\xc0\xcf\xf6\xf6\x1a\xbe\f^gZ\va\x82\xf78\x8c\xa0=Q\x9cm\x0f\xf5\xdf\x9b\x1c7\r\xeb\x15\xc9\xd8/,\x0e\x11\xa6e2o\xe4^\x83\a\x9aLm)\xae\x10\xeb\xad\xed\x8d46\xa2]\xad\xf5\xf2L\xfae%\xc3[q\x11\xab\x1d\xa1\xda!M/\xa1\xd6\xc1\x84=\xef\xe6\x0f\xb9?\x93V\xb9\xe0V\xf1\x91\xdc\xc8,n\xfd\xcd\x93\xb6/\xd9K\x04\x99\nV\xb7\x02\xd5\x02\x84,\x817\xae\xb3\xf2!\x9a\xc41\x1a\x83\x82\xbf/\xd9O\x99\xec\xd3\x87M0\xf0\x19\x8b\xe8t\x82\xf6\b^\xf0\xb2SP\x18B\xb8\x98\x99\xec\x8e\xe1') write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x1, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e24, @empty}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r5, &(0x7f0000000300)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r6}}, 0x18) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r4, &(0x7f00000003c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000380), r6}}, 0x18) ppoll(&(0x7f0000000140)=[{r0, 0x10}], 0x1, &(0x7f0000000200)={r2, r3+10000000}, &(0x7f0000000300)={0xdf6}, 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000080)=0xe8) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0\x00', r7, r8) [ 316.463963][ T2507] print_req_error: 12 callbacks suppressed [ 316.463980][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 316.484219][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 316.496510][T10804] FAT-fs (loop9): unable to read boot sector [ 316.505402][T10802] FAT-fs (loop1): unable to read boot sector 03:30:46 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) r7 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r7, 0x6, &(0x7f00000004c0)=""/142) 03:30:46 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400, 0x0) ioctl$USBDEVFS_CONNECTINFO(r0, 0x40085511, &(0x7f0000000080)) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 316.521424][T10810] IPVS: ftp: loaded support on port[0] = 21 03:30:46 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:46 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}, r7}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {r7, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 316.696303][ T2507] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 316.707982][T10828] FAT-fs (loop9): unable to read boot sector 03:30:47 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000140)=@ng={0x4, 0x3, "10f6586c301c1f2f23"}, 0xb, 0x2) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) mount(&(0x7f0000000180)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='gfs2meta\x00', 0x8a880, &(0x7f0000000240)='security.evm\x00') 03:30:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7c, 0x18126cf8445f9c67) recvmmsg(0xffffffffffffffff, &(0x7f0000006c80)=[{{&(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000200)=""/227, 0xe3}, {&(0x7f0000000300)=""/59, 0x3b}, {&(0x7f0000000340)=""/241, 0xf1}, {&(0x7f0000000440)=""/203, 0xcb}, {&(0x7f0000000540)=""/52, 0x34}, {&(0x7f0000000580)=""/70, 0x46}, {&(0x7f0000000600)=""/146, 0x92}, {&(0x7f00000006c0)=""/179, 0xb3}], 0x8}, 0x8000}, {{&(0x7f0000000800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000880)=""/24, 0x18}, {&(0x7f00000008c0)=""/205, 0xcd}], 0x2}, 0xffffffff}, {{&(0x7f0000000a00)=@rc, 0x80, &(0x7f0000005d40)=[{&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/4096, 0x1000}, {&(0x7f0000003a80)=""/4096, 0x1000}, {&(0x7f0000004a80)=""/234, 0xea}, {&(0x7f0000004b80)=""/4096, 0x1000}, {&(0x7f0000005b80)=""/81, 0x51}, {&(0x7f0000005c00)=""/76, 0x4c}, {&(0x7f0000005c80)=""/190, 0xbe}], 0x9, &(0x7f0000005e00)=""/2, 0x2}, 0xf0e}, {{&(0x7f0000005e40)=@sco, 0x80, &(0x7f0000005f80)=[{&(0x7f0000005ec0)=""/160, 0xa0}], 0x1, &(0x7f0000005fc0)=""/178, 0xb2}, 0x3}, {{&(0x7f0000006080)=@nfc, 0x80, &(0x7f0000006600)=[{&(0x7f0000006100)=""/53, 0x35}, {&(0x7f0000006140)=""/173, 0xad}, {&(0x7f0000006200)=""/184, 0xb8}, {&(0x7f00000062c0)=""/148, 0x94}, {&(0x7f0000006380)=""/16, 0x10}, {&(0x7f00000063c0)=""/107, 0x6b}, {&(0x7f0000006440)=""/201, 0xc9}, {&(0x7f0000006540)=""/192, 0xc0}], 0x8, &(0x7f0000006680)=""/127, 0x7f}, 0x2}, {{0x0, 0x0, &(0x7f0000006880)=[{&(0x7f0000006700)=""/245, 0xf5}, {&(0x7f0000006800)=""/78, 0x4e}], 0x2, &(0x7f00000068c0)=""/10, 0xa}, 0x7}, {{&(0x7f0000006900)=@tipc, 0x80, &(0x7f0000006b80)=[{&(0x7f0000006980)=""/121, 0x79}, {&(0x7f0000006a00)=""/157, 0x9d}, {&(0x7f0000006ac0)=""/140, 0x8c}], 0x3, &(0x7f0000006bc0)=""/167, 0xa7}}], 0x7, 0x21, &(0x7f0000006e40)={0x77359400}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000006e80)={'vxcan1\x00', r1}) [ 316.826299][ T2506] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 03:30:47 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) fcntl$getown(0xffffffffffffffff, 0x9) [ 316.877800][T10836] FAT-fs (loop1): unable to read boot sector 03:30:47 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) [ 316.984576][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 316.997180][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 317.010625][T10849] FAT-fs (loop9): unable to read boot sector [ 317.017388][T10850] FAT-fs (loop5): unable to read boot sector 03:30:47 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:47 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000040)={0x1, 0x0, [{}]}) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 317.048416][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 317.060091][T10851] FAT-fs (loop5): unable to read boot sector [ 317.212275][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 317.224177][T10859] FAT-fs (loop1): unable to read boot sector [ 317.318211][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 317.339243][T10868] FAT-fs (loop5): unable to read boot sector [ 317.358172][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 317.374140][T10872] FAT-fs (loop5): unable to read boot sector 03:30:47 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:47 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) migrate_pages(0x0, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f00000000c0)={0x6, 0x2, @raw_data=[0x200, 0x1, 0x1f, 0x2, 0x8, 0x9, 0x0, 0x10001, 0xfffffffa, 0x4000000, 0x1, 0x3, 0xfffffff7, 0x2, 0x8, 0x63]}) 03:30:47 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) 03:30:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) [ 317.595614][T10880] FAT-fs (loop1): unable to read boot sector [ 317.617642][T10883] FAT-fs (loop9): unable to read boot sector 03:30:47 executing program 2: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000280)) perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x70, 0x2, 0x1, 0x80, 0x40, 0x0, 0x4, 0x1000, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000080), 0x4}, 0x80, 0x4, 0x4, 0xf, 0x7, 0x3, 0x1}, r0, 0xb, r0, 0x6) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:47 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:47 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:47 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) [ 317.669917][T10888] IPVS: ftp: loaded support on port[0] = 21 03:30:48 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$caif_seqpacket(0x25, 0x5, 0x1) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x3) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000000)=0x78) 03:30:48 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 317.872398][T10907] FAT-fs (loop1): unable to read boot sector [ 317.890294][T10912] FAT-fs (loop9): unable to read boot sector 03:30:48 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:48 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) [ 317.946587][T10915] FAT-fs (loop5): unable to read boot sector 03:30:48 executing program 2: socket$isdn_base(0x22, 0x3, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0xffffffffffffffff, 0x10, &(0x7f00000006c0)={0x7}) uselib(&(0x7f0000000040)='./file0\x00') clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00', {0x4, 0xfcbe, 0x5}, 0xb, [0x6, 0x98c, 0x6, 0xb93, 0x4448be7f, 0x3074db87, 0x5fc, 0x8, 0x0, 0x0, 0x3, 0x7fffffff, 0x1, 0x3, 0x659, 0x4, 0x962f, 0xf8, 0xc058, 0x15b, 0x0, 0x5, 0xf358, 0xf9, 0x8, 0x5, 0x8001, 0x1e20, 0x0, 0x9, 0x100, 0xe2, 0xa87, 0x5, 0xa7c, 0x7, 0x5, 0x8, 0x7ce, 0x6, 0xffffffff, 0xe31b, 0x80000000, 0x7, 0x8, 0x5, 0x8, 0x6, 0xfff, 0x5, 0x2, 0x3, 0x2, 0xfffffffd, 0x3, 0x7fffffff, 0x5, 0x8, 0x6, 0x3, 0x1, 0x3ff, 0xb2, 0x33], [0x6, 0x7f, 0x0, 0xfff, 0x20, 0x4, 0x80000001, 0xc0, 0x9, 0x1ff, 0x81, 0x9, 0x4, 0x7, 0x4, 0x5, 0x8, 0x20, 0x8001, 0xad, 0xbed7, 0x80000001, 0x7, 0x8, 0x4, 0x604, 0x10001, 0x9, 0x6, 0x7e, 0xffff7fff, 0x4, 0xfffffffd, 0x80000001, 0x2, 0x8, 0x4, 0x2a9, 0x0, 0x3fe, 0x8c, 0x0, 0x7, 0xffff0000, 0x401, 0x55, 0x7fff, 0x1, 0x1, 0x80000001, 0x8, 0x3, 0x48, 0x2, 0x2, 0x8, 0x6, 0x3, 0x3, 0x45, 0x1000, 0x8000, 0xffffffc1, 0x5], [0x6, 0x1, 0x8e04, 0x3f, 0x0, 0x20, 0x5, 0x7fffffff, 0xa7, 0x7f, 0xe6f1, 0x6, 0xa, 0x858, 0x8001, 0x0, 0xc7ba, 0xfffffffe, 0x8, 0xf16, 0xfffffffe, 0xffff, 0x4, 0x3f, 0x9, 0x9, 0x5, 0x0, 0x6000, 0x4, 0x7, 0x1, 0x4, 0x20, 0x2, 0xfffffffb, 0x1, 0xa6a7, 0x401, 0x200, 0x0, 0x1, 0x4852c1f8, 0x81, 0x9, 0x0, 0x0, 0x4, 0x4, 0x0, 0x1ff, 0x2, 0x1f, 0x8, 0xc53, 0x3, 0x77, 0x75, 0x71de6fd9, 0x777e, 0x800, 0x4, 0x7ff, 0x1], [0x8, 0x400, 0x5, 0x7, 0x5, 0x5e4, 0x6, 0x1ff, 0xecc, 0x5, 0xffffffe0, 0xfffffae4, 0x7ff, 0x7, 0x0, 0xffa5, 0x7fff, 0x4, 0x628, 0x3f, 0x5, 0x2, 0x7, 0x2, 0x8, 0x8, 0x5, 0x80000001, 0x3456, 0xb2a0000, 0x7, 0x7, 0x62e20c8c, 0x1ff, 0x5, 0x9, 0xa4, 0x7ff, 0x6, 0x7, 0x5, 0xe431, 0x10000, 0x8000, 0x0, 0x7, 0xe603f3d8, 0x3, 0x3, 0x4b, 0x7ff, 0x7, 0x5f, 0x9, 0x2, 0x100, 0x4, 0x800, 0x1, 0x80000001, 0xffffffff, 0x4, 0x1, 0x7]}, 0x45c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x311300, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000640)={0x1, 0xfd, 0x63}) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='Kvdo\xbe\x03', 0x0, 0x0) [ 318.137200][T10932] FAT-fs (loop9): unable to read boot sector [ 318.138912][T10934] FAT-fs (loop1): unable to read boot sector 03:30:48 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 318.414449][T10946] FAT-fs (loop1): unable to read boot sector 03:30:48 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x8000, 0x0) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='jfs\x00', 0x24001c, &(0x7f0000000300)='\x00') perf_event_open(&(0x7f0000000040)={0x2, 0x4, 0x3ea, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, r0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x10) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xffffffff80000000, 0x900) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@text32={0x20, &(0x7f0000000100)="f30f209766baf80cb828179785ef66bafc0cb84a19746eef0f2382c744240000800000c7442402db090000c7442406000000000f011c2466b8da008ec8b925090000b85e000000ba000000000f3026650f01c8c4e34d69ddd8f30f09c4c3cd48c700", 0x62}], 0x1, 0x40, &(0x7f00000001c0)=[@cstype0={0x4, 0xf}, @efer={0x2, 0xb743df515b7a4f92}], 0x2) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:48 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:48 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) utimensat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x77359400}}, 0x280) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:48 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:48 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYRESHEX, @ANYRESDEC=0x0, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES16=0x0, @ANYRES64=r3, @ANYRESDEC=r0, @ANYRESDEC=r0]], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x800, 0x0) r4 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000280)=@add_del={0x2, &(0x7f0000000240)='ip6_vti0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) [ 318.586134][T10955] FAT-fs (loop5): unable to read boot sector [ 318.621641][T10958] FAT-fs (loop9): unable to read boot sector 03:30:49 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:49 executing program 1: perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0d2abe219316a85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x3) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 318.731729][T10967] IPVS: ftp: loaded support on port[0] = 21 03:30:49 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:49 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) [ 318.889814][T10975] FAT-fs (loop1): unable to read boot sector 03:30:49 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 318.969165][T10986] FAT-fs (loop9): unable to read boot sector 03:30:49 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140)) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x6, {0x8, 0x5, 0x0, {0x6, 0x9, 0x4, 0x8fd, 0x0, 0xdfd5, 0x3, 0x3, 0x5, 0xd60, 0x6e2c, 0xee01, r2, 0x8, 0x6}}}, 0x78) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 319.127165][T10995] FAT-fs (loop1): unable to read boot sector 03:30:49 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:49 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:49 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clock_settime(0x1, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x1c}}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$rds(r2, &(0x7f0000000240)={0x2, 0x4e23, @empty}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r0, 0xffffffff00000000, 0xe, 0x0, &(0x7f0000000440)="2d5d27c22a5b61b20dfe853fe75e", 0x0, 0x4d6e}, 0x28) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:49 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r3, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:49 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:49 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:49 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x8a, 0x1f}, 'port1\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14U\x00', 0x0, 0x20000, 0x8, 0x9, 0x80000000, 0x3, 0x544, 0x0, 0xc, 0x10001}) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x40000, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7, 0x4000) r2 = socket$bt_bnep(0x1f, 0x3, 0x4) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000600)='/dev/cachefiles\x00', 0x100, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r3, 0x10f, 0x85) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000007c0)={0x0, 0x0, 0x1, 0x1}) 03:30:49 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 319.544249][T11011] FAT-fs (loop9): unable to read boot sector [ 319.566209][T11022] IPVS: ftp: loaded support on port[0] = 21 [ 319.586464][T11020] FAT-fs (loop1): unable to read boot sector 03:30:49 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r3, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='onitor\x00', 0x101000, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000340)={&(0x7f0000ffb000/0x2000)=nil, 0x2000}) migrate_pages(0x0, 0x0, 0x0, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000100)="a2518cc57120400a1ece7833361a86b9aef0aac6ffd7bc9a7b28254b8c2cf681e64faf79c74cff6554f135fb174300d5ca392b5a6ae9ddfdc9866ff67433fa35aa8d0ecd9a9e31fa15937dbf86196d9a716f3904cacf198cb1609079a64002d068a96efe4639d0999991911fa4283cc1e1f0f1da9ec171860e4dd7509e1c563b8074c67575fb7a3a57b1ac4fd0118faeb3e0d5ee93e79f660411a748b3a00a849d704e66306b8ace5d1890baf99c7c41284cb4fd78d64284f1e135a470a71f5dd1b9cc1539afe9d4f1363ace8f4ac8b41dccf54472c33dab301904f8f3d76ff6e550f5ea2b7f9026c998bd4e22924815161ee24cc75e9141", 0xf8}], 0x1) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000002c0)=0x0) setresuid(r3, r6, r7) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0xb, &(0x7f0000000380)="6e719200c94feaed9cd85dfb2fc42016b6b985653235accdf3daf7dad16ac6709aab02d091b472752b6be474e6024dd2ac1c803338dbcccb32b73b3c0c05eff8643d1af58b0edbbb7f7eef93034fa79a0e94855c9c7fb8d748b29bba1e033c11ad528a9889d9b6399b20a7b97d0bc52fea36f0178a35ec1fa40bc4e000f45b74fc6a117c9e775a3118839caa2f01aab3a536e4112e8012671baef4afc4217d0fa809cdf642c2afa10e85b882458494cedeecadeb7b77de79df1be6ae6ac0bb6c5aca42609fea354f806f08ab40fd5d06bc3b9049611c701d28a7ff3a5d6627ed9c9f", 0xe2) 03:30:50 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 320.011345][T11053] FAT-fs (loop9): unable to read boot sector 03:30:50 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:50 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:50 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ustat(0x4, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x1) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r4, 0x10001}, 0x8) 03:30:50 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r3, 0x9}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(0xffffffffffffffff, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:50 executing program 1: r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000004080)=@id, &(0x7f00000040c0)=0x10, 0x80800) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0x9dc, @empty, 0x6}}, 0x1, 0x6, 0xa09f, 0x5, 0x401}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000180)={r2, 0x1000, "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"}, &(0x7f00000011c0)=0x1008) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) r3 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001200)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f00000012c0)={0x9b0000, 0x6, 0x0, [], &(0x7f0000001280)={0xa00905, 0x7f, [], @p_u16=&(0x7f0000001240)=0x4}}) 03:30:50 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$getown(0xffffffffffffffff, 0x9) [ 320.325959][T11064] FAT-fs (loop9): unable to read boot sector [ 320.328569][T11069] FAT-fs (loop1): unable to read boot sector 03:30:50 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x3, 0x105003) connect$unix(r0, &(0x7f0000000200)=@file={0x1}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername$unix(r2, &(0x7f0000000280), &(0x7f0000000300)=0x6e) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x4002, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000180)=0x3, 0xfffffc22) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:50 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:50 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 320.407355][T11077] IPVS: ftp: loaded support on port[0] = 21 03:30:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:50 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f0000000080)=0x1c) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_read_part_table(0x9, 0x3, &(0x7f00000002c0)=[{&(0x7f00000001c0)="a11e563866a0a043ccf0ecaaa952e7ba122efb5b5c40d99c05d5e77a2e47e99ea6e1e24a6447ae97f76f8c7aece2d8130419eba817ba359f823eed362629ff4a2d2727c129aee206ab804e9bed07bf9e25e7f104740b33c2d4d4015b72dd", 0x5e, 0x1}, {&(0x7f0000000240)="fd10e9618bb22f69c6fa8b26328fd1082d5804d9a0963c738c373f5d122cc21839a8ce27c3e7e225c729c3c28c79d2cf3da8358408d39a99ab00da23675d25dc87faba2d94db627ca36b63321bb560d7cd61", 0x52, 0x1000}, {&(0x7f0000000140)="298c826869a3ee5eac88dd9c754149007617a6e3ccc9c426c3f10eb4f2beee903e5d37966032ddf4dc36b44e4b50", 0x2e}]) [ 320.599482][T11092] FAT-fs (loop4): unable to read boot sector 03:30:50 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 320.802838][T11101] FAT-fs (loop5): unable to read boot sector [ 320.902087][T11105] FAT-fs (loop1): unable to read boot sector 03:30:51 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:51 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:51 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x800, 0x80082) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000240)=0x40, 0x4) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept$ax25(r2, 0x0, &(0x7f0000000040)) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x800, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCSFLAGS(r5, 0x40047459, &(0x7f0000000280)=0x40) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000140)={0x4, [0x81, 0xfffd, 0x1, 0x4]}, &(0x7f00000001c0)=0xc) 03:30:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:30:51 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:51 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:51 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) dup(r0) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:51 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0xffffffffffffff1f, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 321.210262][T11119] FAT-fs (loop9): unable to read boot sector [ 321.231689][T11117] FAT-fs (loop1): unable to read boot sector 03:30:51 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0xaebed4643a5b24b1, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000004c0)=ANY=[@ANYRESDEC, @ANYBLOB="919b67f5ef5614b95fe1225b0a36f1f5366fe30a3a87355eece2f42422d09aa3b76f0ee284f48d86d4156d93a892bd010b8fb972bc23c8c06742034ff0a36253368b7cfc2f19663ff9769091417eb2501e8359ff2eff", @ANYRES16, @ANYRESDEC, @ANYRESDEC, @ANYRES64=0x0, @ANYRES16], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000380)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0xffffffff, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1f, 0x4, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r6) r7 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r7) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC(r10, 0x29, 0xcc, &(0x7f0000000300)={{0xa, 0x4e20, 0x81, @local, 0x1}, {0xa, 0x4e22, 0xa04b, @loopback, 0x1132}, 0x401, [0x5, 0x7fff, 0xe27, 0x64, 0x0, 0x66, 0x81, 0xfffffffc]}, 0x5c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x10, &(0x7f0000000440)={r8}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000040)={r8, 0x2}, &(0x7f0000000080)=0x8) setsockopt$netrom_NETROM_T2(r5, 0x103, 0x2, &(0x7f00000002c0)=0x81, 0x4) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={r11, 0x80000000}, 0x8) r12 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$SG_GET_NUM_WAITING(r12, 0x227d, &(0x7f0000000280)) [ 321.374852][T11129] IPVS: ftp: loaded support on port[0] = 21 03:30:51 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:51 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:51 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r3) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f0000000440)={r4}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r4, 0x9}, 0x8) dup(r0) fcntl$getown(0xffffffffffffffff, 0x9) [ 321.491388][T11138] FAT-fs (loop9): unable to read boot sector [ 321.567168][T11140] QAT: Invalid ioctl [ 321.637934][ T2506] print_req_error: 24 callbacks suppressed [ 321.637953][ T2506] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 321.649470][T11150] FAT-fs (loop1): unable to read boot sector [ 321.670974][ T2507] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 321.683126][T11155] FAT-fs (loop9): unable to read boot sector 03:30:52 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x4, 0xffffffffffffff56, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x7fffffff}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000001c0)=0x8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x40, 0x30) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) r3 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="92", 0x1, 0xfffffffffffffffc) keyctl$setperm(0x5, r3, 0x0) keyctl$get_security(0x11, r3, 0x0, 0x0) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000440)={{0xfff8, 0x3, 0x9}, 'syz0\x00', 0x32}) r4 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="92", 0x1, 0xfffffffffffffffc) keyctl$setperm(0x5, r4, 0x0) keyctl$get_security(0x11, r4, 0x0, 0x0) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="5cc16db4b63111e53c572547e51d81055eb11106c84dcfbf87c1eaab510cf97238c8f3c3db06b71061f49f603c3fe6a7c388f32b37d5ac31df1ba6b216392f847049731e8b46a99c28d065e8b21598d7ae70bf97a546c074e539c3c965", 0x5d, r4) r6 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="92", 0x1, 0xfffffffffffffffc) keyctl$setperm(0x5, r6, 0x0) keyctl$get_security(0x11, r6, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r3, r5, r6}, &(0x7f0000000340)=""/15, 0xf, &(0x7f00000003c0)={&(0x7f0000000380)={'crc32c-generic\x00'}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_pktinfo(r8, 0x0, 0x8, &(0x7f0000000400)={0x0, @dev={0xac, 0x14, 0x14, 0xc}, @empty}, 0xc) prctl$PR_SET_THP_DISABLE(0x29, 0x1) 03:30:52 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:52 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={r3, 0x9}, 0x8) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:52 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:52 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x51) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000500)='trusted.overlay.redirect\x00', &(0x7f0000000580)='./file1\x00', 0x8, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_S_EXT_CTRLS(r2, 0xc0205648, &(0x7f00000002c0)={0x84a0000, 0x5, 0x81, [], &(0x7f0000000280)={0x9c0001, 0x401, [], @string=&(0x7f0000000240)=0x9}}) name_to_handle_at(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)={0xb9, 0x80000000, "bafbae5a69533daa8ddb54d7e96cedc1abd17207aa3d061adae263cc21800c31a9470c00f5a71012ae390d14e18a1758fe563e1f2be7e0e4f526878ecfe630747d9d379c4eaf2e0c4cda0a751e315ad65b4686f1ef8fcdd8e606d413ee74d955d172b9682d2c691343690893456427a927c7638625facf41830f31aedc3428a58efab2b49bd9a7a2ce7b079f1e36c27f202e8bd5a4eb816c5914334872b86c4930471881337bdb80e58e4e43c843f0561d"}, &(0x7f0000000080), 0x1400) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='msdxs\x00', 0xde03811b148af803, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x6, 0x402800) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340)="720cf27060b6a0a20cfc4dbe7134042e8d7c55168d657c762c1007201be58827120088143ccc00119eaca66fd1ee59102cf958596668a6b5bf5a9712aa506618f6d306c9c2b0c33dc3f98e814d385dbc79eb7eaadd364802acd8338e4f9b945176d7d50d80020919235fdb2df5d232495d31b77c3d8ffe8705", &(0x7f00000003c0)="e0c99c726bb2af284c8fac9f04385d85ff03ffc1273db376e39a16e543c6100d1cd2d8ac28c4455446e6a614ac74cc85db571978b6a0fe69455c96bc36f6c841fabca4d473d266b865b70af50e0edafbcce2d9de407798f2ed91f858ae957ce1c431e2bfc1ed1492386e8ac7a68d5337ca25d2b2aa05c61e48c5180e1e98e3ce2bc226e8f774a2ed0be6921166d61e92506d9f82d3dc5f301aed91f57af6693b7f1d06773538b95b306747e0424d901351c42d942707a89926ea060d257f36bdc7d044983057e0393e5b8f2d438e41c88727ee9db4448235d60e"}, 0x20) 03:30:52 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) socket$inet_smc(0x2b, 0x1, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xffffffd5}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r4, 0xffff}, 0x8) 03:30:52 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 322.060110][ T2507] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 322.077971][ T2506] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 322.083308][T11168] FAT-fs (loop9): unable to read boot sector [ 322.090136][T11173] FAT-fs (loop1): unable to read boot sector 03:30:52 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 322.148637][T11180] IPVS: ftp: loaded support on port[0] = 21 03:30:52 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x80000, 0x2) close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r4) r5 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r5) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x10, &(0x7f0000000440)={r6}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000080)={r6, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f00000007c0)={r6, 0x61, "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"/263}, &(0x7f0000000400)=0xffffffffffffff14) r7 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x1, 0x22420) fsconfig$FSCONFIG_SET_STRING(r7, 0x1, &(0x7f0000000280)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', &(0x7f0000000300)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e21, @multicast1}}, [0x2, 0x0, 0x6, 0xe51, 0x8, 0x8, 0x800000000000000, 0x7, 0x4, 0x5, 0xffffffffffffffff, 0x7, 0x8, 0xfff]}, &(0x7f0000000000)=0x100) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') dup(0xffffffffffffffff) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r8) r9 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r9) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r9, 0x84, 0x10, &(0x7f0000000440)={r10}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000080)={r10, 0x4, 0x1, [0xfff]}, 0xa) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r11) r12 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r12) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r12, 0x84, 0x10, &(0x7f0000000440)={r13}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r11, 0x84, 0x77, &(0x7f0000000080)={r13, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r8, 0x84, 0x75, &(0x7f00000004c0)={r13, 0x3f}, &(0x7f0000000500)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000001c0)={r14}, 0x8) 03:30:52 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:52 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 322.322633][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 322.342877][T11193] FAT-fs (loop5): unable to read boot sector [ 322.349120][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 322.361339][T11192] FAT-fs (loop9): unable to read boot sector [ 322.399425][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 322.445353][T11193] FAT-fs (loop5): unable to read boot sector [ 322.483795][ T2506] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 322.496233][T11202] FAT-fs (loop1): unable to read boot sector [ 322.591237][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 322.605496][T11209] FAT-fs (loop9): unable to read boot sector 03:30:53 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:53 executing program 2: read$FUSE(0xffffffffffffffff, &(0x7f0000000140), 0x1000) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = shmget$private(0x0, 0x1000, 0x78000000, &(0x7f0000ffd000/0x1000)=nil) r1 = getuid() r2 = getegid() getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000001140)=0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000011c0)={r4, r6, 0x0, 0x3f, &(0x7f0000001180)='*\xeduserwlan0wlan1GPLem1,eth0(ppp1posix_acl_access\\security(eth0\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001200)=0x0) shmctl$IPC_SET(r0, 0x1, &(0x7f0000001240)={{0x1, r1, r2, 0x0, r3, 0x80, 0xfdf}, 0xfff, 0x3, 0x1000, 0xd8, r7, r8, 0x70b7}) 03:30:53 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$EVIOCGBITSW(r3, 0x80404525, &(0x7f00000000c0)=""/108) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_FLAG(r3, 0x0, &(0x7f0000000140)='lazytime\x00', 0x0, 0x0) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000000)=0x3) 03:30:53 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:53 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 323.042966][ T2507] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 323.077064][T11218] FAT-fs (loop5): unable to read boot sector 03:30:53 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x5, &(0x7f00000013c0)=[{&(0x7f0000000140)="c7afb8d44b4919869eaa965c9a3a3d0c1ea9252a185d948588c9ab9ce07bd9cc0c0cbab92ea4da4cd7d68df40718de96b7271baa62ecd9b8dddb2376979f95daa27b8ee6e4832b580d16571a7aa9ceec556a20a360b303fcb5674cec7f4bf4d13f943c0b10447000611aade6e75f497db5155e1e8303f7bbb1e7e117f936e18a64a15dab875796e4c8120522c2ae3f1d264914774c649bbf9290dca47355f2d0ebd9d7307e703f0377f165f72dc699ab26717b9b962dcc4569e9f7f51f240cdd560835fe1f53e6ba0d62809164749b7da5c456916f7814", 0xd7, 0x8}, {&(0x7f0000000240)="8494040a199ef6311e15533b1ff21c2d22851bc102a638261961506ceb14d0cb078c0b5029cc02795f1c2dabf9de59ac5771bad827bb0305d392e1e4745800cc49ee0e219ed8293bb10fe10ead217a6b7f9fba5bafa40ed323649cb94eb63c569a884be33cba8ba1352d74188d9c9e1248a351b10efee0dfb22f55f1a88bda14da2d7a9622d8b89a65cc41f480402fe95746404a58b0f550b507b6b545726bbaa7b441dbe27b1e395983651e42c64921909b65", 0xb3, 0x1}, {&(0x7f0000000300)="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", 0x1000, 0x9}, {&(0x7f0000001300)="85fb39c5d58c24d1d44c27c0b6a0308167843bf058a191ad1c5762e0961134ff9a7fde39874cdb1f916f42f1f1488ab20ae2ed9ab4494e48e83617fa23d54fed2d9e0b8320540ffa2532bfc82ccf3752b9f70264170ffb6cb11a808dae22ab23764eaa43c3371cb73648b8c5f6a9", 0x6e, 0x4}, {&(0x7f0000001380)="3f904146a2ae476238c5cde6a59394be9489406956fbeb2f1efd8d77652d615ab47ad42d6f6e3ed0c196e20e2210cbc70ac2", 0x32, 0x8}], 0x8000, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) lsetxattr$smack_xattr_label(&(0x7f00000029c0)='./file0\x00', &(0x7f0000002a00)='security.SMACK64IPOUT\x00', &(0x7f0000002a40), 0x1, 0x3) socket$caif_stream(0x25, 0x1, 0x1) syz_read_part_table(0x3f, 0x9, &(0x7f00000028c0)=[{&(0x7f0000001440)="5cc9e477560b32cd11deef7b051083701583938c2d625ea5f9792e16d969e64d242b012108f07a6dfab9a4d77b380c9cda61053abdc3ea0a8b95feb193964d50ccad7ac7f0713da9377c85926c5c4cc297c7153c7b0681b57e535ef16727f9a02b4c3594bcd0a5810ba36839a54381ce687486178c5578c6820ad4fe940a", 0x7e, 0x4a}, {&(0x7f00000014c0)="383540cdaa654c288aa48762deeabcfe952c6a13fce1b0d5a7699df99558bb03e39730bfcc7d53f4df3383e529a592edbbb8ae86cd1781ee2bd23cfb78a40918b5980d5a94ac34bc056d7e51991c11059b7beac9d84f73bef80604518677aac6c817d053bd965e84b16ddc23c1158109328e07824f24c4b307a959fc72f2766e55c97471ae1ec21d372906fa4673787f2250db22a28b9d9547f51b19109a9e9eac0178055a57ef73a1387334e835557c4e1e6393dda68ec63250398dc30ac8bc3483e3a3f8977cf1fd2fa7228e4baf017464d2d2b7669044f652064c117640dc0ed94f27aa1827dd9ad1", 0xea, 0x67f26999}, {&(0x7f00000015c0)="9b86da9203670f06f5c5dcc5a1a29c434085fbcb0db8110587dda334877e2804c2606ffed991b401ea6ddc53a4268f45bba9dca5dfbc56f197bcd312de03e1d94c0a01178a57fa33d4e85525d86fe4cf86dd7898547247edb5243c5745da54fc42f497f4ca3a64f72cb0d09924bb5320d43aa2dcf6937cb7b4d8047a43ebfec22cd52f46474feb46d2e14913f4d16ad261f16e6777137c3277d79554d458285aaf453bfed306eedcff10858934c1df9bc170eb530f0c9e14408df82283b206b3", 0xc0, 0x1}, {&(0x7f0000001680)="466a059c935cefbf932149e2d8e1332a796fc93bdd7dbc2ca530b2fb4dc7141e79997d7c1352534ed8c7ea01597ae5937a74d5e6d58708660114fe7501c6d2cfbcaa4a1a23ffb7903bf8a822b5f408a2ccc9e0cf685aa0532fd98dd6c77987800176c587dbb10c1095600e2207c5efce2f076c235aa60218f66cb54a07f1145113c13c3edeb6473d871dcdd96a8b116e86894cafd82fad6d79d9095f7e9f760d8adca05d71971385ba496a7e3b7c2c194fb42b46fc0438", 0xb7, 0xffff}, {&(0x7f0000001740)="d473b7bb9cab02b77c1520b563c92c7990d8c09c01c17b9e8154501d41a4738b203b8f8c2d612eecd5", 0x29, 0x3}, {&(0x7f0000001780)="0aee04ac0073fe9a2f0e8068f158619315be06560ff3d66f9d124ab13ade6fd5ccc873372a9bde3fe358d4508b31dda51cefde1f0451ee6b4b674eea2453c15a92f1189fcdee75f5d9755c31f67493f62e191281e74e8d62bdf088a0ad75fabb041126993887929536cabfdb73ee81cbac958615534bfe98ebabcb8b066f9c15ccb07839ebad83c37726a405740d11004470e37afdaacead301e4a501cb5a5cf21c0eb8351977607d90df760dcd29a17644b6611517accf1aeffd5d56d37b07b956880d5e4efc017471ab96857cd302d04bd907eeb23947d74deac4fc0c8d0e1c19146ca9a9f8cdb0387173740bbc3604d792ee57571a64b245ecce871b4ec61414478e6d208b62b2eca256015e3e11ccdbbbf9ed1bcc71e6f69b15c5e85d41848eec38099faf1999b724190f88ac9b5a8ad11872cfc05b1a0d5c73cc89eae0f1cf48532f35c7a481a90a34cbe2b429e59a376a2d48fcd10b74961b0400312a836bb11350599554027bdbe89ebc22c40250aadbaf5274625b67fac98bca619fb3b76d063920f78a3c89da718521a8e15af492d8b8c3efb5b8b6127fe7f59a18c741956b9020610d0c22f934c16ef8461796cda0e820928b2008130ad55e57467e1441ace6cf1cefbcb3cd59d4ef4b8b1f25af05c86f1005677553cc02d469b603570e0eb25ee3b8bea2a28b341d51ae3a3fdcf2580e1dd14f8d16082c251294ae99a28071523df1f242ebe4b87e7c2763ee2a2e97ee58d7074994861dc42fd31d0f902bca20974fcee194bbdd54eafa98b00a95f2b9cb26dafbb28a5592403598e684a1348a89a8705f0f208e03c2ace4bac81b294214850d786db4cc9e3cc4c8d5e4f7715d229fd1f37b15308a29727673c122128dc08f252726ef9675a97f9089942d856d466297e8ad038c99a4c35eb1995d4b5817bc40b1688cb6c14752007c8e9fa790134d5d1e8931e721350cfa5879b3e088f68cdc04acf41c110aa8973a0051295159e5e7cbf5ca49cd7b021fc67596e1a6a8ab9a696c7db0cea0a84626a93db0a09b5787c1c5ab1ce3f47e0d019ebdd95f39b6ca9347a4569e7a43ba48e8121bcf6e9b622f0323d545d688e954fac7a82e1148e1efa032b83376357dfbeb786d93efdd58b2d02a02e0d7001ee6178eddf3687e8da9a690c86a62f703ad1ca44ffb877b5f5c6f268601d8551d2bd4dc085eff3bfe5d2d963bdcc9d6c13c39253bb4b4c771afde7f130ab0099084cfc2133dcf09966d09310d8ddbadf152bbdab1c1a75a36594026683301040a71a206ed45b8506ff45c799d678a9682a704c883130c99654ae6346f7aeb2cfc37d6abd8a4711eb1e3299d42185bc868bb6bda1d75dd0908a7ed3ba03ed51d093215afb3adb3b54de2957184bb5d2ec97cdcbec7d930e53574eaf19f59a00bace8ff5201a056541d9a41ada0b6fcbbcfa27d3eee4a6c35e9b3d809134ed481ea77e9c032ae4a9e938529d8722c9c44ad2b01e186b50dcdfcaf49851203be955b1cf1b3e78da94752ac8ee30e7ca6da672ce4d9ddb1bc17112034eabe1a08ad36e0af64a25dccd70875549b5b98a686febfbc463e3640f18eda41d614b7f43db4eb5ad103949bcc110635ec4342edcd1930a089f2ba8d8dfb3b18d695e888646dfbf8ae947ce88245f8d3a5c8b878a9ea8f12e69176fe28af7f14da7d50146f514ab23e1aa7980a11c30fb2c2ac3fb402d13f48090b3443123d085a276b8ac23c39dd8e57de0502302f9773b159be75a69d5f9b1cfa005b9dfae6121b397eabe062ca2806df9571969df1a1b2e6bbb0783b78a6f214edb36296cc28ded5b3e70449665db7e4d7384a86a7e41a1df77bcbead913218c84326a894f7395fd3eac1b12c1e3883f60a837692cfa53c2bbf4bbf45ab25482d5211918579bc6f2eaa3ebf5eace39177886ba58d48b79286db2e61ef2bb3410f93ef60ba939d122218fdbf97764644f8f32e13f0cfa199aed6239a063b874f361e47ee13038cd1a530cb320bf7e8d5b390b3791cbe140f8ef8c118aa048aa2bf847deb52f59a7911d85d5bf6b1b3580a2fc85cd1550b74736e59b9a7ffde2df7f09a9e04222bd72a5d038d2935285d804dab01b7e05e7f3098c24e8149f4fff283b5b70560fb6b25db8e758a44ce0c55a705fea74838995d00142e52b5d3b0378fabc7cd2511c9e13a7e84ed7514b63339f969c340e412aae2c92701373d384eddfe037c25812ff3af0add19a8cb0e541d214f00ad42ef31c0818e7c199ccb914961d125acc5403ce58ddbb565c52bad6e2bb6ac5f842c3beba465924c918955d523a8251e7da5dba483adfef35598ebf8cb42fe42b666d76cebaeddb0e29720d7bd22ab42f0dc820488f3b545b361e4ab480fdc43ea563e4ca3997fa9d3049724a3b6c8c7a0b59a6166cb0ff42a666f2f0bd33407af25e180c4581f59951868231c6c7a32a18ab84fbd0e67b83827e9b801fefcc85759b4fbf00e96c860d03660005d8f203fe706777882d96a91c38717e343f161eb82f5c48480a3f35b3eeedf9ff74c4f1d3ae05215c051345f4c31d8acdcc2f94fd5c4216791796e06c8fb645dc9ef65b79dbfcda66700e7b41d8871e0f87bb73b1d164e19e0d6ca786c140dfdd0b12161dadaefc6ae31fd869523aab340ec40da30fb4368456624871306e4989879394de06bac303bcb6dcbdefdd97d8e2667c05c1c9762303e300c1ddb11a1603938a18a51981e18cc1633d8a1a44e4ff1517e1b9ccec4cd9eda8de1b3f63dce8899b319017d0b0146633a4a8c03ca30ff7f5a2691c8c356f6c23639fa5e90c666d21ad23edf3f5bcf669e8d0b96360c3c1bcb4f61dce9c44aee086f4530a71501899afd897f2efc067e9e1361e9d91c1ba330cedfc78f2286630c5047040235398cdbfd5b531f7b32574c666db73c704c57c491a8390cbcbf3061573dcb77b0ffeed17a33c8ae90c6a2cb8716a66514aa4ee4e835821c27b0f4e6a7a13e29e658762261f9a5c3a325a5d6cd13190ba418eababedaef1e196304aebd25cf728066fd0abb6a7ac856bb7adaba4dff4d5bd95d4bf7c335d4317208a619bcfbddf9b4a896b30b27747cd80a3e603bfd61a10e7c27d24ad2279a3169e1c421037573fbb691bb0029a9793363053b4fdface92d0dc6ef05a6e29e4ed7ec901fb0abf04f7c2535cb1475c1494b5b2132c6a18f081c39f13e2a8e1c0bb1febf65c9b8e24f2cf84e54e9cf9f09fe4fec1a8e3f8459ece0d9492d19aea5d983363805a0a1e4bb59ca3046939e17b1ca7b8053d8373de9b2bd7d1fab3fd5c770b4898923b7a2ede27ce065487475f7584b0f3fc973795648857523d74459277202e71603f535ea35eb5fae04f69141b86ebf84811a4744f918257d25679681e3c5adb31058f336249a10efaf704ec351df96d1ab357ab6d3cfddd10b42c4c143d51faac93dc090fa0ac5699cd41827262e8b9df458b0f0c5ad0125074a465177536d38cd12c26f5601c210815898b8ff056fd44462b4d6e78cfe696f0f9dba770b1fe77725227bee319b35e1ae0c19b5e96a9c3fd2570fd841cc2d45b4f155693733d327dbc7a9a78a8a5c425b323f899f63b319aa33cd48941c18b76d7a96df03e2575cc81d0d06e156552e6011e0230f390336a0213fe1ea93f39d89614eeac4da11193e0a57bbf09cbc7a7aa673557c4abf9660d36e3d4459c92993627d669e7bb755cbfd1353d205a320ddc3f83bd4ecc0331e9865b814b3eed18b5a9e92ff73c2babba72241546b45f957bee2e7517cea235dafb7c7cdd41dac6ea1af1b8faa0d82aa234b3106988b62d2e49048597b85be748ba578308ce2904dc9ffcec76cb4834ccfd351be52c5c82df01d1e8a6c79dde5fd7d2d31f0e129e45d467524d4e155ab5fbe915106c7bf2b8a7875c40b6d4350826e73b1676f6753b7b23372e54796f47aeec3e46940aa1dbf30b5a43494753558ee7bf15db2f774c41404aaa2d9271561c48848bec591ead180d12ee28f418ad6e3fc0b8838f37d38fd7042c0e4f3851c4774acfe09b4e6d5bc701c8b7ca0215b4349fa1b2ad8862ca432ba4503a1e58ccbbc912e28693291b26a812cbb3baeb8ddec9cff1e51c5b6462e74d98c6218d9f130e85b468de83c241913524bf9f7a45ae0be731784ce1f2e9771daa0a2c64a9234a7331d912266f9fa2acf7481fb016bd1a62a6fd0bcfa579330707f7af35ec091d7df91d8218f816e8d4ceecfca90c9ec773c782c5faed4e2cb3e7cd1d01b21183e209f5177a8ae250cf67f16cf61338e6e22120984ecce4e956ed5aa04e07d78381b0443807adde1be0fd9a047e4409cc509708bf06e368323dd01a637a5aef03e02de0b8f2cc419737fe73bdceb485187b22dd52fa5488cf11659b46306c515984169e70097eee6dbdfffb64b95f58841da43bea63c3ff3a3f0b25768ca02ced4565d860bc6b543966e5fadd5b3d460d9a9e596e3c970b54dd9898458bbbebe42f12e7f62a6da566777102d8457bbdcc4dcf8d0ee3627e9f4246c8a034f5f4b7c7aee922a4274abe1317100753488d78d715cb0f4a0cd9776e124407e0f543ed64a4a4c94b4352b7ff0a39d135916d544c6b01d33c02280e14f06aa77edd21d57bc36cfeb4296255fb661d98188e3eeed5ccd0ef227c33ed019782a3a1a923926fa85e5ed153527ca1a2d4935a958ae051bab510c7f49a44e7292256f1a36ffef8ad29e7c0d8dc1f09cbae7a3b5d3dfe01f2cc368d6a2e9ed55d4929b9b7c99584e715960a71b0d985e5aa937d179777d07a8bd9eb3cb60cc2276f4313a58daf28284617ed6f2e4283765e8af5746f42c864ed24a20ca60e66f95740f993c1d1e9f3bd068649a9f97dc1a145a3cb7ca477be5abb760171d174c6a954acbcc68dbcd90dfa5aaa7437470c58de547995966a75375bece752ef0e5d3578d41f11a05b6da8f42a60a4fc4311cd2f85bfcf13df59c1003dbe2a9050c53bb77058aff308b53985a57d935d32d49fe4ed1cd90916f4104ee1ad90800ff58272413bd8a220bedf075ec22ee0d459a742ba6ec396495cb41e045a86598499520a7f63a308d97f4cde18deed7f03d425db63806ae3c67b7324d50f059ff6c6d8b03c5ce12008071a46c17fbaedf6d6ca3f3ce29ebbc6b57f6452ef5b07b6d095e8ab54ab292814b29387c95896fa5c2bdd972d61ee3620e75d0b45a15c12ade9c8e5e4785f60a91deff0e393ee0cdaa715f57ebc3cf4c746a76b1f08cb6f0917e1a20524f0cb063e543a547f2fc1703b52a3f540d431f8c361be59e4a3327c82d58e8166db0c32d5f3c74120b9c5093a80b62a1cac4ea4dbe59b35b57284db5758eb61a3ee26b74ffb7dd324a211539d81333e14edc285b41cf8141ce5a40b74d4eae1c4a0b80026b4763c5bb397100cd5cadeb4bfb7ebce290428399d03185188380e4c283afe25ff5157127563be7a87abecb7ff63db4278d030ecf26f7e7b94b89565e6a7237a275e3754f0f6146ee14e6b4bb6ece8f64cb3055cbc85898a6be86084fe54151450b7b56bfcba9b63e08e3634fcd3ed358a98120e3fc01cb32d70f71c5a8b6018a835e764ab17c118252613e28a422cefab4a1f72793b45f450cdcf1441141a5d41291be88ea109ac84f9397cf57b46e02990e051314720b34ef83194690c8800a0d0dc9c781980f78859edc42f4ff96787f06d4f97a32c4a2424780bf69ffbbb623f453f333426210b2468161bac7172b5fcefb49968bab83a4df9bbc1c6c0801ec77c5b63f20cd9d94e80882f25ff6c0", 0x1000, 0x1ff}, {&(0x7f0000002780)="4ec7f002d60efe889a9148cbed037d", 0xf, 0x2}, {&(0x7f00000027c0)="e53bd8bf7633aaf75ead04befb0a4ad60f7f6738e2fd70f5368a181ae8cdab7726bc4feb764f67886b02d170d6c75cbe0450ee1e621063ccc44caac06de5b083318ab4e1ee0960ca5d354313f1e7c10bb4e6975811213e5f826bdebdae2d60e94edb73b775b71e07154720733fa916c63a11b050d795ff58531436c7adaf6938eb0307423af5f36f247e9a462a51a2dea67e2e9874b9d72fe4a6c6a1fda99e3d51be68238af160359dd6cc23d34c85dd9587b845b4c724a423f92e0a500cde6a", 0xc0, 0xffffffffffffff21}, {&(0x7f0000002880)="04968d121ead5ad1a6c0f7619941d6c2f9eddfdba8a323e68bc1f9dd084e2685ab55b94620be32354dc72e0634b6d4f0b0", 0x31, 0xe89}]) [ 323.095472][T11222] FAT-fs (loop9): unable to read boot sector 03:30:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x2, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x2e, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r3, 0x6a29, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x1, @dev={0xfe, 0x80, [], 0x1e}, 0x2a3}, @ib={0x1b, 0x8aba, 0x5, {"5c7995bf18a7f24dd05d4c601b5ef7d6"}, 0x9, 0x2, 0x9}}}, 0xfffffffffffffdf2) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:53 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) fcntl$getown(0xffffffffffffffff, 0x9) [ 323.209861][T11236] IPVS: ftp: loaded support on port[0] = 21 03:30:53 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 323.291746][T11239] FAT-fs (loop5): unable to read boot sector 03:30:53 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x13) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000040)}, {&(0x7f0000000080)="e518ed1c6c55833e4e46d487ef93967b504408441c00c20a2f9be999b7f4677f0808f8aa0bc23c28", 0x28}], 0x2, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:53 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) fcntl$getown(0xffffffffffffffff, 0x9) [ 323.442112][T11252] FAT-fs (loop9): unable to read boot sector [ 323.471782][T11255] FAT-fs (loop1): unable to read boot sector [ 323.634517][T11264] FAT-fs (loop5): unable to read boot sector 03:30:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:54 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f00000000c0)=']\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000140)={0x0, 0xfffffff9}, 0x8) r5 = semget(0x3, 0x4, 0xa8f1525774a3f82d) semctl$SETALL(r5, 0x0, 0x11, 0x0) semctl$SEM_STAT(r5, 0x0, 0x12, &(0x7f0000000200)=""/77) setsockopt$inet6_udp_int(r2, 0x11, 0xb, &(0x7f0000000100)=0x4, 0x4) r6 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) open_by_handle_at(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB="980095a0635eb0bb829b6c000004000000d995dbc2a4c32aa99fba7cdd3e84a3df04cb6d473b6c7b11b5d1ecc8dd3e82091f4c2de9b4cb592fbdf8b57bcd8b981d40f887b4c4b832c2aa6bb251daa52f37db43b3a4cf44cb3ba79d51ef4c113962e4973d7b4f78daf635356a9ffc730678d436a67d775fd8d6f946322999eb0e0288c279c65989a4bf18c1289e78c8be513d"], 0x400180) migrate_pages(0x0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f00000001c0)={0x5}) 03:30:54 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:54 executing program 2: mknod$loop(&(0x7f0000000100)='.\x00', 0x6000, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x400000, 0x2) socketpair$unix(0x1, 0xc, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000200)='fou\x00') r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=@newlink={0x34, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) r8 = dup2(r4, r4) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINK_NETNSID, @IFLA_IF_NETNSID={0x0, 0x2e, 0x1}, @IFLA_PORT_SELF={0x0, 0x19, [@IFLA_PORT_INSTANCE_UUID={0x78, 0x4, "99ce202adab888d06540176dcb699c13"}]}]}, 0xe6}}, 0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8002}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0xfffffffffffffcc3, r3, 0x925, 0x70bd25, 0x25dfdbfb, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_PEER_PORT={0x0, 0xa, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_TYPE={0x0, 0x4, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x20044}, 0x80) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r11) r12 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r12) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r12, 0x84, 0x10, &(0x7f0000000440)={r13}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r11, 0x84, 0x77, &(0x7f0000000080)={r13, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r10, 0x84, 0x71, &(0x7f0000000300)={r13, 0xfb}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000003c0)={0x0, 0x401, 0xb024, 0xfffffffb, r14}, &(0x7f0000000400)=0x10) r15 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x200000) ioctl$VIDIOC_EXPBUF(r15, 0xc0405610, &(0x7f0000000080)={0x1a, 0x7ff, 0x200, 0x5000}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:54 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 324.157950][T11283] IPVS: ftp: loaded support on port[0] = 21 [ 324.216794][T11286] FAT-fs (loop1): unable to read boot sector [ 324.230740][T11288] FAT-fs (loop9): unable to read boot sector 03:30:54 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:54 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:54 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 324.279563][T11293] bond1 (unregistering): Released all slaves 03:30:54 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x282000, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000001c0)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x4}, 0x0, 0x0, r2, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) pwritev(r3, &(0x7f0000000100)=[{&(0x7f0000000000)="be7e90749c45d52903e973438ab83e5340b3d48c9a33e9fc815717d8c20765790825cadd989ab02e89a0870aad39376688", 0x31}, {&(0x7f00000000c0)="218d08e8b6062f0049305ac284d0dfbb4c203906c83f2141746b54ee3fab2b8d0e3b1af9af82d25c407c5a7843ba81aac4ec48847b73b1b2fe5b090f85b3", 0x3e}], 0x2, 0x200) [ 324.388584][T11302] FAT-fs (loop1): unable to read boot sector 03:30:54 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 324.478269][T11309] FAT-fs (loop9): unable to read boot sector 03:30:54 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 324.613054][T11317] FAT-fs (loop1): unable to read boot sector 03:30:55 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:55 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}}, 0xfffffff7, 0x40, 0x10001, 0x0, 0x1}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0x1, 0x400, 0xe99e721ab32fb860, 0x4, 0xfff, 0x6, 0x5, 0x8, r2}, 0x20) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0xfffffffffffffff7, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @remote, @dev}, &(0x7f00000004c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000006f00)={'team_slave_0\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="3400000010000d0700"/20, @ANYRES32=r11, @ANYBLOB="00034d34913a00000000000000140012000c000100626f6e640000000004000200"], 0x34}}, 0x0) r12 = dup2(r8, r8) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r11}}, 0x20}}, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, r16}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) r17 = dup2(r13, r13) sendmsg$nl_route(r17, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r16}}, 0x20}}, 0x0) sendmsg$TEAM_CMD_NOOP(r3, &(0x7f0000007140)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000007100)={&(0x7f0000006f40)={0x1ac, r4, 0xbd6cecf5bcc0b995, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0xb8, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x343}}}]}}, {{0x8, 0x1, r11}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80}}}]}}, {{0x8}, {0x8c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}]}}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x10}, 0x800) 03:30:55 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x101480) execveat(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='cdg\x00', &(0x7f00000001c0)='^*@\x00', &(0x7f0000000200)='!procppp1\x00'], &(0x7f0000000280), 0x1c00) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) 03:30:55 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:55 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 324.971092][T11336] FAT-fs (loop1): unable to read boot sector 03:30:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/if_inet6\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) connect$can_bcm(r0, &(0x7f0000000280)={0x1d, r1}, 0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x400, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/83, 0x53) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') 03:30:55 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 325.106385][T11343] IPVS: ftp: loaded support on port[0] = 21 [ 325.217091][T11352] FAT-fs (loop9): unable to read boot sector [ 325.234294][T11356] FAT-fs (loop1): unable to read boot sector 03:30:55 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x7, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETLINK(r2, 0x400454cd, 0x30d) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_type(r4, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) fchmod(r5, 0x38) 03:30:55 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000005c0)={'syz0\x00', {0x20, 0x3, 0xc8, 0x3}, 0x2d, [0x6, 0x6, 0x7f, 0x1, 0x8001, 0x6, 0x58, 0x8, 0x7fffffff, 0xc9af, 0x3, 0x9, 0x3, 0x10001, 0x8, 0x3, 0x5, 0x8001, 0x1, 0xb8, 0xfffff800, 0x200, 0x6, 0x20, 0x7fff, 0x5, 0x3, 0x0, 0x3, 0x7, 0x5, 0x4, 0x8b, 0x0, 0x6, 0x607, 0x6, 0xb6, 0x9, 0x200, 0x101, 0x9, 0x9, 0x9, 0xdc, 0x6, 0x80000000, 0x9, 0x40000000, 0x9198, 0xce, 0x4, 0x7, 0x73a000, 0x4, 0x20, 0x39f0, 0xb0, 0x9, 0x4265, 0x9, 0x9ef2, 0x7, 0x5], [0x7fff, 0x1, 0x8, 0x6, 0x1, 0x8e, 0xffffff30, 0xffffffff, 0x6, 0x8, 0x400, 0xfffffffc, 0x20, 0x21e, 0x9, 0x1, 0x5df361e4, 0x0, 0x5, 0x3, 0x4, 0x2, 0x7, 0x7f, 0x6b5d, 0x4, 0xfff, 0x7, 0x4, 0x4, 0x7fffffff, 0x8001, 0x6, 0x401, 0x9, 0x8, 0x0, 0x1, 0xe2c0, 0xfffffffc, 0x7, 0x9b4, 0x6, 0x4, 0x0, 0x3, 0x1, 0x8, 0x1ff, 0x9, 0x8, 0x9, 0x3, 0x8000, 0x15e, 0x2, 0x5, 0x80000000, 0x1, 0x401, 0x123, 0x5, 0x7ab, 0x8000], [0x5, 0x1, 0x0, 0x2, 0x6f9, 0x0, 0xac4, 0xb7, 0x6, 0x28, 0x0, 0x7fffffff, 0xc27, 0x2, 0x80000001, 0x9, 0x5, 0x84000000, 0x1, 0x2e8c, 0x56ed, 0x18000, 0x7a, 0x1f, 0x2, 0x2, 0x7, 0x100, 0x1, 0xffffaae0, 0x80000000, 0x3, 0x7, 0x80000001, 0x8000, 0xfffffffb, 0x5b, 0x2, 0x9, 0x6, 0x0, 0x9, 0x6, 0xf039, 0x9, 0x4, 0x800, 0xaf2, 0x8, 0x6, 0x4, 0x6, 0x1, 0x7, 0x5, 0x0, 0x3cc5, 0x7, 0x9, 0x1, 0x20f6, 0x7, 0xffffffff, 0xd9], [0x4, 0x6, 0x7fffffff, 0x1, 0xff, 0x10000, 0x5, 0x10000, 0x4, 0x20, 0x4, 0xfffffffe, 0xfff, 0xfff, 0x0, 0x8, 0xfff, 0x0, 0x5, 0x400, 0x6, 0x8, 0xffffffff, 0xfffffffd, 0x0, 0xd2, 0x3, 0xdd8, 0x101, 0x97b3, 0x7f, 0x81, 0x1, 0xbc3, 0x9, 0x9, 0x5, 0xff, 0x3f, 0x1, 0x0, 0x401, 0x5, 0xee, 0x400, 0x1f, 0x400, 0x7, 0x1, 0x3, 0x6, 0x1, 0x0, 0x80000001, 0x9, 0x8, 0x7c7, 0x0, 0x7, 0x3, 0x1, 0x1, 0x7ff, 0x100]}, 0x45c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440), &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:55 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000040)) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 325.536124][T11376] FAT-fs (loop9): unable to read boot sector 03:30:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:56 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:56 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:56 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='i\xf6\x105\t\xb33ju%\xf5\xdf\x17zw$\xa5\xcaO\xd0\f\xc1\xe1\x84\xcc!\xaeK\x18\xd1[\x81\x1be6(\v?\xf8d\\\xbak\a\xb9\xba\x8feS\x16\x04\xe7\x9f#\x14-\xaf:\xc8\xa2\x84y\xcc\xf2\xf5\xe5\xd0\xcf\"A\xde^\x1d\"Ke\xfbp\xc5e9:!\xc3\xf2aU\xb7N\x19\xf4\xa30\xbf\xd5@l\xfa\xcb\xa5pE\x9e\xb2\x8d\x8d\xa7\xe1Z\x12}\xe9\x9bBg\xb2\xfdH\xf7W\xf9\xfa`u\xbe\x03\xee\x93\xf8\x1cC\xf4\xc0-\xfc\xa9\xc3Pu\xb6\x8c\x98\xb5[b\x00\x00\'9\xbe\x06L\xd9M4M\xbf|\x1c\xab\x9c\xb6\xd0\r\xc6\xdb\xb2\x03P\'\x83\xfc_\xc9', 0x0, 0x0) 03:30:56 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000002380)={0xffffffffffffffff}, 0x180800) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000000)) r4 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x10, &(0x7f0000000440)={r5}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r5, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000023c0)=@assoc_id=r5, &(0x7f0000002400)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000002440)={r6, 0x76, "1e1791a4f8c4754688a24e723263272551f101abc6df0dcff49a605048995ffe72ddf75ba7dc5d1f5104499a01230787dfdfbc7feb0e8b58633f0512aecb1f5fdf3adb5ed6d6035745bc937be36e6904cf510980e51b71c070d21bc85aa38d1d237b1f35fae54bbbf90dded894b5f632285f21b83fe0"}, &(0x7f00000024c0)=0x7e) 03:30:56 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:56 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 325.852441][T11394] FAT-fs (loop1): unable to read boot sector [ 325.853095][T11392] FAT-fs (loop9): unable to read boot sector 03:30:56 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='dax\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x101200, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f00000001c0)={{0x20, 0x6, 0x2, 0x6, 0x3, 0x6}, 0x7fffffff}) r2 = socket$inet_dccp(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_buf(r4, 0x6, 0x21, &(0x7f0000000280)="72a64cb1cf2256c13b0c0f6a1c2963f9fdaeccbb8fe11192e71c1b4643a288c3069dfc0fc5bfa6e4975e03e949edfd3c716b8b8b9f7585edf8954430069017572b1a7f6539399d044a4b206add0fae50fd", 0x51) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @multicast1, @dev}, &(0x7f0000000080)=0xc) 03:30:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x10ffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f0000000180)}, 0x10) migrate_pages(0x0, 0x0, 0x0, 0x0) r1 = gettid() r2 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x3, 0x2) perf_event_open(&(0x7f00000001c0)={0xf54d7338a1f28443, 0x70, 0x1, 0x3f, 0x0, 0x1, 0x0, 0x5, 0x20000, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x4, @perf_bp={&(0x7f00000000c0), 0x1}, 0x40, 0x1f, 0xa5, 0x9, 0x20, 0x80000001, 0x3f}, r1, 0x0, r2, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(0xffffffffffffffff, 0xc018643a, &(0x7f0000000140)={0x2400003e, 0x1f, 0x39}) [ 326.017907][T11412] FAT-fs (loop1): unable to read boot sector [ 326.030032][T11405] IPVS: ftp: loaded support on port[0] = 21 [ 326.036215][T11415] FAT-fs (loop9): unable to read boot sector 03:30:56 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:56 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) inotify_init1(0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f00000001c0)={0x20, 0x9, 0x9b6c, 'queue1\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000080)={0x0, 0xc, 0x2, 0x100, 0x22, 0x76, &(0x7f0000000040)="40da3b6ccf89a46176e3e66e95870e9c03f2269551a4507acbbd71c496249a83bc98"}) [ 326.318871][T11431] FAT-fs (loop5): unable to read boot sector 03:30:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:56 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:56 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:56 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:30:56 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:56 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000000240)=0xfffffffffffffdfe) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) r3 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setresgid(0x0, r4, 0x0) r5 = getgid() getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) r7 = getegid() r8 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setgroups(0x2, &(0x7f0000000180)=[r9, 0x0]) r10 = getegid() r11 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setresgid(0x0, r12, 0x0) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000340)={{}, {0x1, 0x4}, [{0x2, 0x2, r0}, {0x2, 0x1, r2}, {0x2, 0x2}], {0x4, 0x4}, [{0x8, 0x2, r4}, {0x8, 0x4, r5}, {0x8, 0xa, r6}, {0x8, 0x6, r7}, {0x8, 0x6, r9}, {0x8, 0x2, r10}, {0x8, 0x1, r12}], {0x10, 0x6}, {0x20, 0x1}}, 0x74, 0x3) 03:30:56 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 326.687824][T11444] IPVS: ftp: loaded support on port[0] = 21 [ 326.715638][ T2507] print_req_error: 19 callbacks suppressed [ 326.715654][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 326.732956][T11450] FAT-fs (loop5): unable to read boot sector [ 326.746119][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 326.749770][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 326.757762][T11455] FAT-fs (loop1): unable to read boot sector [ 326.768801][T11457] FAT-fs (loop9): unable to read boot sector 03:30:57 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:57 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:57 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x40, 0x0) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000380)=0x9000, &(0x7f00000003c0)=0x2) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:57 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 326.989624][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.007808][T11470] FAT-fs (loop9): unable to read boot sector 03:30:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x14, 0x80) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000000c0)={0x3, 0x8001, 0x8, 0x1, 0x0, 0xec, 0x9352}, 0xc) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 327.165858][ T2506] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.178315][T11484] FAT-fs (loop1): unable to read boot sector 03:30:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:57 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:57 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:57 executing program 2: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x64) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000200)={0x0, 0x0, [0xe8, 0x2e, 0x9, 0x2]}) wait4(r1, &(0x7f0000000100), 0x40000000, &(0x7f0000000140)) r4 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r5) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='bpf\x00', 0xe639e7c56e21cb90, &(0x7f0000000300)={[{@mode={'mode', 0x3d, 0x6}}, {@mode={'mode', 0x3d, 0x401}}], [{@measure='measure'}, {@uid_eq={'uid', 0x3d, r5}}, {@smackfshat={'smackfshat', 0x3d, 'msdos\x00'}}, {@hash='hash'}, {@pcr={'pcr', 0x3d, 0x2d}}, {@subj_type={'subj_type', 0x3d, 'mime_type'}}, {@hash='hash'}]}) 03:30:57 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, r1, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000100)={r5, r7, 0x4}) r8 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x10200, 0x0) ioctl$UI_GET_VERSION(r8, 0x8004552d, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCGICOUNT(r10, 0x545d, 0x0) 03:30:57 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:57 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 327.492433][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.503829][T11501] FAT-fs (loop1): unable to read boot sector [ 327.519106][ T2507] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.531785][T11500] FAT-fs (loop9): unable to read boot sector 03:30:57 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:57 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2880, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140)=0xf04, 0x4) dup(r0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000040)={0x1, [0xe95]}, 0x6) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:57 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'lo\x00', {0x2, 0x4e21, @rand_addr=0xfffffffc}}) [ 327.634345][T11513] IPVS: ftp: loaded support on port[0] = 21 [ 327.719897][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.731642][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.747996][T11521] FAT-fs (loop1): unable to read boot sector 03:30:58 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 327.771207][T11519] FAT-fs (loop9): unable to read boot sector [ 327.802382][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 327.814578][T11529] FAT-fs (loop5): unable to read boot sector [ 327.875648][T11535] FAT-fs (loop5): unable to read boot sector [ 327.950406][T11544] FAT-fs (loop1): unable to read boot sector [ 328.009744][T11542] cgroup: fork rejected by pids controller in /syz0 03:30:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:58 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:58 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:58 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:58 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000001380), &(0x7f00000013c0)=0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockname(r3, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f0000000000)=0x80) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) r6 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r6) ioctl$LOOP_SET_BLOCK_SIZE(r5, 0x4c09, 0x99) r7 = socket$netlink(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r8, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfc000000]}, 0x8000}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast2}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_MON_SET(r4, &(0x7f0000001340)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x40008}, 0xc, &(0x7f0000001300)={&(0x7f0000001480)={0x128, r8, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @rand_addr="c694bc38fe28622ce2b37aff300d29ab", 0x6}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffe651}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @rand_addr=0x4}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x5, @remote, 0x997}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @empty}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3396}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x4000c020}, 0x8000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x10, &(0x7f0000000440)={r9}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000001400)=ANY=[@ANYRES32=r9, @ANYBLOB="04900100ff0fdffcc2a6727113d41c55fc12756cdcfe410bacca6bfd7ebe6bb062811f5b967f08ebf8724685c58bcd9ee6511e9d8a6b7f21dd6ca1a84b10956f62126532d07ec516d5d309a0f433c52259c7baea2cbf7eb958f3b75932cd2048a37769c546c2522a5717d5e50d35"], 0xa) setsockopt$inet_sctp_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000140)={r9, 0x3, 0x1000, "06183f37940d4d178bcf6ebc8e1642b2cc7aa7056a45bdfee797232f3eeefcb3d30bbf64d3c71901bd4e943ea079db5b2ea9921483b23268d92c8ea701578712f6a60624bf12917e1b2aa6e1bf10ac0d0ad355cfbb023267010790d4d0107e1b931c184570e04083f3be02e2ec50d0f20a0aa962ca017e4974947a85e1689593cc3c625a0047aa35a3d93bc08d7ed9fc714b00ef9e8a5ae65880a218fcad0361f48b519760c8343bf920ba54786a8ed62ab6a10d613a6dcfa0ca442b10b75246a8b8cc41e31628552854781777f87d0a3a70891df268096ce397a355f00b666a7fd0d49e5f07329ff8474bcb206a9f5f9b33d430925fd955e05bfd0ff2b18a62209b9b305267e588062ed7886ddf8f61f58464318004dac8b105a37fb63faa14dbbe2858ec5ccdfabb3c56106fc661e5105669d69e065c71c5c8263c98bba10ba981150e5e888b463ad31649cde028389f830bde86bc9bfad1ada99574fa20e9726f480b63209121c8a1e0066c44e24dcf1ad4b3518e41fc3e8f0435bdae5cc7213d9b625bf28ac4723751ede02b386f14da39fa4a842e46928d6bd847edd96733f9a470674a22561c6bab3b4fe20d329cd77d3f55ab54c4b65ebc2f4d8dfc80838fa6c2ee8b74055b262a97fe7ff22ec17a514dba8e9c8e3d187e0afbaf163e2b9f94b0d1811274899ab133a2258c9d7a2a75a62c7a1fa8407f851aaa1c0f037321471f57fc1c5b865fe05676c29e888f892d043a1d7b7dc0b760aff29e4db5f67ee093eefdb74a19bc0443f9b22a4a92816fac9534608c8a17a94831b839a55faae0e738c6baba056a430b9b727c2fc44af6287f7dd458528d550242f5102f50debaa0ecd3d327ca3f6a38acb7aded641a75b350201e78b9ecd11ff568f8b6588f7fa87b6a90ff4bd2cea4af990a8a71b4521f158e5b64f101df5345673e2e151afff80cdb034971386f2be8f3fbe43b88c960729ab2235ead3f7b4bcdfea14fb41cee20962e4782b840a97f1e7f068a2cf271c36dd4e89ad5ac0cff9412be6b23d4519564c43f6878d90c89d4ab88892b8f333b2b676af42bb3aee0a6878128cbc1d66e61b619c9fbd4fe8538f339ba152ea859c5ccbc25cb8bf10ec80847415ccb111b6273a4d238cfd8a870a98825809bd3fcf76a9be1bc11f54f5f1caa1b671fceb4c8d458d4d6e2cab2d118d4d934db7246111b9a15027a36bc26d59dcb5f7a498f6506db872a16c2e2d15606b3b5103aa4c69c842c6dbf207756cb88ab8c7262101d1ad9b510fc41e6564e080dc2651dafd7dc55c7710f676050a4b30c86c3b0a8a1d49537084aad336d9fddb120f885b5a8d6d4f71bcee32609dd6d5483932c8003bc7bc53fb4abc02e1bcebb23676e7d62936cd787eefe58dce5a044268f4e634e324620ebc28c3837032699a51e1fd6c3ab56ccd45120f9633cdf812e9bf77e5e8284d5a0670290edd92358a60b1781c3256c77852a228b82b876c961d81c33ceca27e35062897000f7c9c192aa85a0b7f0b1bc5042cb87beaed428ba306d540e6cf33593efb31adbfd97d4910d4c49d47114d859f08de6c1d58bf52054326f626ca1faf658f0f85baf6527f964b4670be2c692e7da08602f864d849448fe385c10b54031b1b8d2a2a15e091b39089670aaa4f15e582ef91ffcaeb3eda99ee36992e1c00b7cabdadd8069fd03af422e7cf927238c0a8ca3439df0bb6bc0e55988cfa01461537a9bd3f64188c936e44c9e7b7667965ea914b8e4735d3acce3d90d61de3fa62b9d98626756559645a4dcbeb22348003e08f476651941989d2bfada0d1d8e3cff3a13f54777684a8e0d913082e031151cb2d08e8f28d775942baeaf0ba825b82faa400a8943a2bbd29b8a07b765fc8f5c611e83bf63ed96e43fea64f6592a955ccba0334638ffb7ee6c99bb79611fe941d059a15c256396677cadffed3a0fac5776c5dafb90a123c8adf73b1f926d85e867b901a2f0c2f20a8017dbafb4fe62c082790ab8accd1f6745f5a2f7f27252260018ef4dbcc529eaedd06ac97e7ad3280a0012f3d5e38f60efb0ff03a8e33a4139d1b07b4bc9784c3ea734588152394eec5df94950a5cba665abf50dfc0ed381cbd0665ca2cdfa2b46026778318664d8440062c1f235c3587bbab563284f4f0d8cee3d1673dd1847ed45b153e92b92ad7275935417393a1e53d3d1ae05385c202643f0639bfafc770f114eab471fe6c1dce1eb5c4a4c3fe3128d411ce22f14b7878726abcd69310935eabc4ed850bf1c949821aa59080cb5bb0395bac32d7bb5562fdc13c8669bae6cca1b404e0187ecd1bd33c4b5cc6eaee83fd36c64c03acee2f87e50c4f17940fc7cc26202e2cf0f5868b1cb64836d78ab38088c6b04412d484128dee066fe8dbc5361962d85610540dc1586224dd27633c1427fa1d86b600fccd69ee9f537c1cf521da1fd9e3c2b3a948015a2442d2cb44a8afbea692c42af1ce447cde5eecadec2bbab4e2ebf8c546e71c566be0702c1b7ad0c6a8fde93d163fc1174e0df613ce54c962333ccfae8696ea613768c5b756a3fd97675361e50b513841083fa1f77dba371c3668cd7bbf93a31eb6531e1c3ae8dc413de7e8fd595c65fba851922bc1fee1f5c895bb24feaee7d0064aed6e6f39ce096d88fc7110afe3aebf2a637b09511b349002db5c84c76537b13f5a9409c4cfc71641d3abc604c5b9c2a61995c984a7c911defe50fec81c1f37fc315cb0434275f923f312ddc2715b9fa67ad620f2f61b601610dcd7c8861de98556a2677ccc2b616c7315fe2383be9b8b54e2433af7c8f4e2fe126e9c7663f0dbee5b90a72af0e8386a3e53c3771d8954fad448ff93efa4d29afbbb9d59015ed4c33bf80b9ae1da055bfa443bb2e8a90a8f4d32c802b873db7e994e357d2f40340cf123be8f4795e7505cb98e4ba6f8bc3cb03aac2c02bb0c3227c4aff6329dc2960ca6ce9a07f96e857a82256dcffe59078e32b26be4b77b6c28f3856b8947dde94dd7282176eab96e8a08c00625a18ab9b1b9747850b2985023da45f15742510f90b814416eca52054f9b9af124e788a04ba8e47931c5725fa1ba8bc97a8db0e73269db52daca6d4766c36974f2a2588f9ff87520c781fafd3ca4f86811dc5af23b0f8caf28f32b6b83ca98f50c87946c13542b71bc43d0399ef92a6ee0757669d8df8a0133cca1d12daa43a8c57b94eba617c6d7592de92df0b97079bf4450dfae54c1b65433b7a72f0e497b6f7147a08872117e7347fa6969bbac9dd7c5c06dcb615ab2203f29ec6b56a8241c82bc50f212fdce693b689af9a4cae87fe9cb877158da5ad2958f2723f6092cc4918a60822861837cf3f223cc519e7bc9a06e852309137904d290b87258c49cb9874df1a792a08a64a3ba67e510f3314d8e77321065a71bdfb4147d6b750296f996f4488d5aff3077c787ddc4e33eb9a7780594db247535a719ae7fb8fe107761cc1fdcb9215bd11b6085824605bb398b3d8fb6fed9c67e9e408e6c0dec88a7174c4fc5fb8c2ac13f3bde77f04b3fd0b63bd23875e813e2980e277c0f93cee431868f1c336d87432312baf2dfe5c652d0b1ace19be95a4cc07d10fbfbc33acc0965cf3700a14aed266a54948ee7945764e4c7ea18054e4cdfefbb10578d4f5b29631ab2a0f65913b7133d4c5b07dd0c14e87107f1a94deeb691a596febd2be861c4d4afd060fcb9ffa5307ae2c14f1a7ba954c6689dc3435d724fec77f8148724c43fbbb7eb0bdbece05139f6b7d5f3ecfd843f156621f8204c040711736c9a29f9bb276cbc81a9c6ebf64c420b7b4534bc2cf0ef5be4f729e65cf25fea410ea8008f83d79d9069ed2285c7733e69a9cf3fa55db3d152c2cbd4df0f8b161bd0eb05f74170634227312690a24653ddeff9685bd08e0fcd898b91311e138b4c64b84edc2dd16a6155b81a5dc9368b5d4961e26db1760eb0621d805a21c6396ab90539414cea111a11debb6a5d90f42b5c986457fa468d4073d041c5d86f17ec90df0950eb4e33870a90a0194a0981fc2fd0afdce3922af79ce058e45af69ea09277a9d4172fc870971c9fbfa6506f36eb2cc2a48304922740fdb75c5f892c4cae8bb359ed488a0c368b47dbb9a81495fc4cf531fb2d02ad3c0b16dcbc909edbe276994e864203349b2388e6fdbbec5bdc73f5813c804707644f56032a425b383fd6bf1cbf1950df51fb1c0a1953fe661abf1685a29ceb06a53c8deb082047db13310d315cf0545bb776763cc4107e47595f524807b7277f21db55a3fc2748eac786edb0d93b7d304541036ef5f14244e3eccdd3b7525690186f569a16c75702cf0571cf26e2d1efdbd29302a0377162e5e694e03016b09fa8625d27683a299b4298d82a5386614e7fbfbec9c6239ef8a2dca131c6c352262f08b82c18ddd8662db65fbc0051197e2aafab5bb440bcf18154249b60008a0531042d8bbb699b2b4040fbf9a5245f7f4dbb424bdb471d73a19343ad61f286c6dc2646683336e76fcf5f57a7d2f18626544f485327c46d9af0dae7a1402f9ff1eb2cd92fd5bad7c4bda158a551ad7d0107097fc0e5eb8165a3e93b85754ceca43cd43b08821178759aeeeed24d8da8b6e3958db7d1b0063bc800c54c46c3224c8bf37a8d5e378d1861531a89b4b448c1460dc191e607929e1f83a3de902510746a2bae05cee04250ecf46c51bb54f2b08d3af52e0d5520f0d20ebadf72f83594abb0a1929db643525dfbede660a358d7c0cef30f6dbc181994aaf4b8a86353eada10e0ccdd516003b0e1b8df133124a7de49567152a43b11d8102411321f018b8bab09cd11fdab6606baa56185712aabe3fc7e7b2cbf94e7c3a4a8f6303274d35f8f812abaf333be42bae42eeba57981578c3f8061c53307306f3c4b3a0df91306ad339349c6650012aaaf0ed10890270e7aec7f8044e1c2f18045ebb9f3c4cdfebe65cf5a12283fe1673328cdff49233f74bfe4a096a774b28010e9ff403ad4c1fa724a48709be8a2615f4b8e59f7bd7014da78394a83699c66d45709fbcbad109c10ebd4313fd274de9052f7f104726f8635b769bd565d00038a0eee965b97fd0b15fd4e45304421ef3017dfd743ed1b11fd65b31bfd9cb1a043e59d88227ab31662ff36b696df90725bcde425a3993bdd7fe6ce2f9653e07ec5702179c13d1734e37d48a9b6fa2749df4af413feed5e2eadaa049350915c9baad5783610c30e3113e6b5464ad780abdefc7c9180f4831e59474e49ebd69af3ecbaf24dcba88a1fb8586e4a3b50bd902b3c9c537c13c2b1f8f7d406c7e66437460f1f6b1dd13b3c0697e91b602203fd89eb0009731279410a31166785d9d33514a51b44c6154975dcf32b980666c41a27f3db75668f240a5d9a0eb61b9cb39a129f7b2e5bd2da4944b023111f410ae50c35f486fcc2b6806cf6d765a6e3cba054159fd4953146aa9eb7d8e232e13bfed5c79c875d4f3d8ac2f7bd4480f844e72b86daf213dfe0859f4b9d40246eefdc3a08a9e659688874b85906d944b6634450fbf2f49a1dc4d9e34ed7007073484cc070c5242a4e780c52e0c279aa88f8e229523339a89a9dffb13b5047e5be9d3a820b78d11dd19201407192cd5fef827564876fd07c5b0573eb2698be5d9cc843c30fec26e5a9e1e0811afc996c0360e1a16d5baddf07bedc7f1ae58f6ccea109a8cb803a06f1cdb9b723477e0333d6bce3ba2d84ecd2a1fa6bb5244a15d884c764005a94c62da179064eb85e9f46d6005551f1d4987d2c57ada76073c62e3752a"}, 0x1008) [ 328.281262][T11557] FAT-fs (loop9): unable to read boot sector [ 328.315095][T11562] FAT-fs (loop1): unable to read boot sector [ 328.330249][T11566] FAT-fs (loop5): unable to read boot sector 03:30:58 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) close(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 328.367909][T11571] IPVS: ftp: loaded support on port[0] = 21 03:30:58 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x40, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)) r0 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000780)='./file0/file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="b7436eadf5df962a52efe1de5784efacb090ef96a6dddda207f8070176cc933fbf9786bc99108ffa943f2c397f8ee7877f09ce805c7d41eeb4ae9618e9ff0c44e37af1b06fc56d7e236d229e902ddfbf438089741304c4c0f5867f6d053370c7f7325299c00461c157bc25267a6b1500463635f01bc1ad07f956dd0235e39f45b72de3663520b03948ddb458ba0ee49ebee24db85b59cfebf2bdaafa", 0x9c, 0x2}], 0x2000000, &(0x7f0000000640)=ANY=[@ANYBLOB="626172726965722c6ee66477636f6d706f73652c6e6f22f6c8dbbad736e8456172726965722c666f7263652c6769643d", @ANYRES16, @ANYBLOB="2c6e6f6465636f6d706f73652c6e6f6465636f6d706f73652c636f6e746578743373746166665f752c61707072616973655f747970653d696d617369672c6f626a5f757365723d6d73646f73002c6673757569643d308b30394f6338352d626136662d367266302d666665332d36356661340962372c657569643d4c167224047c8f9915580d4ddd7df04b2f86453ddf459fc744737ffe8bb99b78b8e6364581a1ac2c450f56cb5bae7f160e498e64933bb520df9fa8ac245562e9ceb824774efc47c8da6e1b1326a12b126f445cae736e7334c43862e2d663261ccd55e0d0", @ANYRESDEC=r1, @ANYBLOB="41e0cbaec850dc2dc1"]) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) getpgrp(r4) 03:30:58 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 328.446962][T11572] tipc: Enabling of bearer <> rejected, illegal name 03:30:58 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:58 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 328.592125][T11560] tipc: Enabling of bearer <> rejected, illegal name [ 328.710227][T11696] FAT-fs (loop9): unable to read boot sector [ 328.725574][T11698] FAT-fs (loop1): unable to read boot sector 03:30:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockname$unix(r1, &(0x7f00000000c0), &(0x7f0000000000)=0x6e) 03:30:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:30:59 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:59 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = semget$private(0x0, 0x4, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fstat(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) lsetxattr$smack_xattr_label(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64EXEC\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="6b657972696ee70000"], 0x9, 0x4) setreuid(0x0, r6) r7 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setgroups(0x2, &(0x7f0000000180)=[r8, 0x0]) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000200)={{0x0, r3, r4, r6, r8, 0x7, 0x7fff}, 0x3, 0x6e6, 0x1}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r9 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="92", 0x1, 0xfffffffffffffffc) keyctl$setperm(0x5, r9, 0x0) keyctl$get_security(0x11, r9, 0x0, 0x0) r10 = request_key(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='vboxnet0em0#\'+\x00', r9) keyctl$revoke(0x3, r10) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:30:59 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:59 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_ifreq(r3, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00', @ifru_ivalue=0x7f}) prctl$PR_SET_FPEXC(0xc, 0x80000) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r1, r2) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, &(0x7f00000000c0)=0x854d) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 329.118434][T11714] FAT-fs (loop1): unable to read boot sector [ 329.129853][T11717] FAT-fs (loop9): unable to read boot sector 03:30:59 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:59 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$VT_ACTIVATE(r0, 0x5606, 0x7f) [ 329.234778][T11787] IPVS: ftp: loaded support on port[0] = 21 03:30:59 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) close(0xffffffffffffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:30:59 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:30:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, &(0x7f0000000000), &(0x7f00000000c0)=0x4) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 329.402986][T11835] FAT-fs (loop1): unable to read boot sector [ 329.425850][T11833] FAT-fs (loop9): unable to read boot sector 03:30:59 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:30:59 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 329.469760][T11842] FAT-fs (loop5): unable to read boot sector [ 329.522619][T11865] FAT-fs (loop5): unable to read boot sector [ 329.678779][T11954] FAT-fs (loop9): unable to read boot sector 03:31:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:00 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfff, 0x0) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x1, @null, @bpq0='bpq0\x00', 0x80, 'syz0\x00', @null, 0x3, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r1 = socket(0x10, 0x803, 0x0) write(r1, &(0x7f0000000400)="260000002200470508d258002b1f00eb0101c7033500b000"/38, 0x26) setsockopt$sock_int(r1, 0x1, 0x20800000000008, &(0x7f0000000280), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x4000000000003, 0x2}) r2 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendfile(r0, r4, &(0x7f0000000080)=0x6, 0x80000000) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r2, 0x15) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:00 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:00 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) close(0xffffffffffffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:00 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) dup2(r1, r0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:00 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:00 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:00 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 330.070587][T11974] FAT-fs (loop1): unable to read boot sector [ 330.086512][T11973] FAT-fs (loop5): unable to read boot sector [ 330.113275][T11984] IPVS: ftp: loaded support on port[0] = 21 03:31:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) write$P9_RWALK(r3, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x12) socket$rxrpc(0x21, 0x2, 0xa) write$nbd(r3, &(0x7f0000000400)=ANY=[@ANYBLOB="9a"], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) shutdown(r4, 0x3) ioctl$MON_IOCT_RING_SIZE(r2, 0x9204, 0x11f163) r5 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:00 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:00 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) chdir(&(0x7f0000000080)='./file0\x00') clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000140)={'lapb0\x00', 0xfffffffd}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0xd07e, 0x2) ioctl$sock_ifreq(r2, 0x3, &(0x7f0000000240)={'tunl0\x00', @ifru_data=&(0x7f0000000200)="51fb8a0420ae4bfae4034168b2d7d287e0a1c264145bb238fa2a669f06508d82"}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x200000, 0x0) write$input_event(r3, &(0x7f00000002c0)={{0x0, 0x2710}, 0x4, 0xbd0, 0x2}, 0x18) 03:31:00 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) close(0xffffffffffffffff) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 330.424545][T12102] FAT-fs (loop1): unable to read boot sector [ 330.458941][T12106] FAT-fs (loop5): unable to read boot sector 03:31:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:01 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:01 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:01 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2987eb5bb920dd99, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x20, 0x7, 0xfc, 0x4, 0x0, 0x0, 0x8, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0xffffffffffffffff}, 0x4709df8fed4907cb, 0x7, 0x5, 0x3, 0x1, 0x5, 0x5}, r1, 0xb, r0, 0x19) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2272, &(0x7f0000000140)) truncate(&(0x7f0000000040)='./file0\x00', 0x4) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001340)='/proc/self/net/pfkey\x00', 0x8881, 0x0) recvmsg$can_j1939(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000001380)=""/110, 0x6e}], 0x1}, 0xf3ecb3e5ed223c8) 03:31:01 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000000)={0x7fff, 0x20, 0x0, 0x8}, 0x6) 03:31:01 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 330.876407][T12222] FAT-fs (loop5): unable to read boot sector [ 330.877188][T12220] FAT-fs (loop1): unable to read boot sector [ 330.897233][T12228] FAT-fs (loop9): unable to read boot sector 03:31:01 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:01 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 330.951350][T12231] IPVS: ftp: loaded support on port[0] = 21 03:31:01 executing program 1: timer_create(0x0, 0x0, &(0x7f0000000340)) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 331.029873][T12311] FAT-fs (loop9): unable to read boot sector 03:31:01 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 331.138212][T12343] FAT-fs (loop5): unable to read boot sector 03:31:01 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 331.189811][T12351] FAT-fs (loop5): unable to read boot sector [ 331.308225][T12358] FAT-fs (loop1): unable to read boot sector [ 331.357930][T12361] FAT-fs (loop9): unable to read boot sector 03:31:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:01 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000640)={0x80000001, 0x6b, 0x5, 'queue0\x00', 0x7ff}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) openat(0xffffffffffffffff, &(0x7f0000000600)='./file0\x00', 0x8b4f0bbd51e8cf7a, 0x68) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup2(r3, 0xffffffffffffffff) r5 = getpid() sched_setscheduler(r5, 0x5, &(0x7f0000000380)) mq_notify(r4, &(0x7f0000000080)={0x0, 0x24, 0x0, @tid=r5}) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000700)='/proc/capi/capi20ncci\x00', 0x420000, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f0000000740)=0x1, &(0x7f0000000780)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r8, 0x84, 0x8, &(0x7f00000007c0)=0xe9e, 0x4) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='affs\x00', 0x2410, 0x0) syz_mount_image$minix(&(0x7f0000000340)='\x00\x00\x05\x00', &(0x7f0000000480)='./file0\x00', 0x1, 0x189, &(0x7f0000000580)=[{&(0x7f00000004c0)="fb060f325d0eae0a4fea41c836d7a2b925d04b85a9659d240e2808375c9ae0eebcf4e1b6f88601744b277f513567b77a497c882e0afdd8503236bd985b1915118dc072f1f37d3eef4125c42cb82122f5ffd7197ec3f8c2a0b236ebf7b64caaf38292469589ac68c56251c13c6eb76f0d3e81bf0f20028df19fdaa269f33cc4c5bc869ad65f92707654611b34b8d643403aa1264e4891ec246bddfb4da5c86e3fe93a9ad17c0b36eacb43d8d47f263fe86e9a08", 0xb3, 0x1}], 0x148400, 0x0) clone3(&(0x7f0000000300)={0x1800100, &(0x7f00000000c0)=0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200), 0x26, 0x0, &(0x7f0000000240)=""/152, 0x98, &(0x7f00000003c0)=""/178}, 0x40) signalfd(r9, &(0x7f00000005c0)={0x3}, 0x8) 03:31:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x733e5a67dbe769c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3fffffffe}, 0x15109}, 0x0, 0x0, r1, 0x8) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:01 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:01 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:01 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$capi20(r1, &(0x7f0000000000)={0x10, 0x9, 0xff, 0x81, 0x6}, 0x10) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 331.704680][T12475] FAT-fs (loop9): unable to read boot sector [ 331.712046][T12474] FAT-fs (loop1): unable to read boot sector 03:31:02 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x0, 0x4) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:02 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:02 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 331.817733][T12484] IPVS: ftp: loaded support on port[0] = 21 03:31:02 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 331.951473][ T2507] print_req_error: 28 callbacks suppressed [ 331.951490][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 331.973954][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 331.975278][T12495] FAT-fs (loop5): unable to read boot sector [ 331.985674][T12498] FAT-fs (loop9): unable to read boot sector 03:31:02 executing program 4: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 332.062662][ T2506] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 332.075484][T12506] FAT-fs (loop1): unable to read boot sector 03:31:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:02 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:02 executing program 4: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:02 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:02 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) r1 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r2) r3 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setresgid(0x0, r4, 0x0) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setgroups(0x2, &(0x7f0000000180)=[r6, 0x0]) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) r8 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setresgid(0x0, r9, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000002c0)={{}, {0x1, 0x4}, [{0x2, 0x0, r0}, {0x2, 0x0, r2}], {0x4, 0x1}, [{0x8, 0x4, r4}, {0x8, 0x1, r6}, {0x8, 0x3, r7}, {0x8, 0x8, r9}], {0x10, 0x5}, {0x20, 0x2}}, 0x54, 0x1) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$SIOCAX25CTLCON(r0, 0x89e8, &(0x7f00000000c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x63, 0xfffffffffffffe00, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000580)=0x4, 0x4) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000540)={'bond_slave_0\x00', 0x8001}) r1 = getuid() r2 = socket(0xa, 0x2, 0x0) readv(r0, &(0x7f0000000640)=[{&(0x7f00000005c0)=""/38, 0x26}, {&(0x7f0000000600)=""/5, 0x5}], 0x2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setgroups(0x2, &(0x7f0000000180)=[r3, 0x0]) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x5, &(0x7f0000000440)=[{&(0x7f00000001c0)="59f3abd3d0f89b08160125c7a01f53e7ec442e9497283c47ed6de7721efa23222d42b10a0ae4500eeddff10272d57bc9ff7d92bd2394fc5479c1b4c7e43d2f46a5a5616d10d09b391442e107c02b8d4c917148a6b6d56144d32cca79763aa55c396e868890d50f2ea32c87380de41d91635cec74c051841d8cb82c1b9685", 0x7e, 0xb}, {&(0x7f0000000240)="9f5b463648342985cf48eff0ac94ba9574fe6be62460b1d1f4362e7def9add779bc0b87252056f749af5cde5d42f8dd6ff", 0x31, 0x800}, {&(0x7f0000000280)="75ede09ef3e58f08192d14a8b6f0f18f758cb46394842e2f1204e91d9aa361de71cd8de1d502eff77383b2f95f1509f5540e58c04f89624ddb439f92605de3c0eeb9dce9749832688f000853afb7b6e529133bd27edc00ff37f07a541b4ed4b345071aa83966f534c0ea16ff63b84a77ae95ccf2afb0ca8c02b17e3ec97aada847d6be4d2c5b99b07118a561852a8428aae5c8564f9d5acddd9550381c8e30c2da40e573e84ce3cff269fdb5070c41e8a69429f10be1c9e28917cf5e9db0716ba1e149fa6f939454f4f616a3348d2c133cc7b5863eadfee6e69a031afd4a39e7a3", 0xe1, 0x3}, {&(0x7f0000000380)="fbdc3a74bf0a6f1a4a6fdffecbdde8dfb0ab65f4ae1d8387ccda65bce42e33d5eaa999e83fbcb4f55275d959ba48fd08786c1a9696db6a5da635389c210b5410", 0x40, 0x1f}, {&(0x7f00000003c0)="52820b55cd8b8c3c867ac5efd5791988b1b5c3ce53a141d0eda7aaca6bf8d75bfd00ac522d766d40191f4e840f25e50f8afc42cde05fed85abbbddff1fb42a005796318d82c429643978d4c830b8b719ee0ac7410b8186f315086fb3bbeebe3fbdeed4f3edf799b9126c7d3c038377d47eb6c1f157b35bf2a435", 0x7a, 0xfffffffffffffff7}], 0x760852b02d49ae59, &(0x7f0000000680)=ANY=[@ANYBLOB="0000000028fe046dea895c0959f0dce5524cac7f702cb700ccd948662930ca02800f4edf4e16cc862a6949073cc106204ba0352cb61fc083f86411a1d6fa87e08018be1cfb24062aa1818acaa1da58226e43909541b22d53617761d60dd26166d36a38aa49c555af47d0ff66ce108618847f4ac4906d51600401eb4d515aef613eca4be7dfaf94920e4863c7b67a819d13fa5bf574e7eeefe5d8c4c21f77af67581d0f6fcdc6f742ee5b7d6d2d263b0000000000000000f14d0808ce44afff50cdce85659654245a81866e656a0bf15b", @ANYRESHEX=r1, @ANYBLOB="0000bd3498dbc95a2a368861873b2f00003d", @ANYRESHEX=r3, @ANYBLOB="2cf566edbb5f61707072616973232c686173682c66743d726f6f742c000000000000000000"]) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:02 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 332.571211][ T2507] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 332.582771][T12530] FAT-fs (loop1): unable to read boot sector 03:31:02 executing program 2: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000100)={0x1, 0x0, {0x1, 0x2, 0x100a, 0x1, 0x12, 0x4, 0x1, 0x7}}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:03 executing program 4: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 332.712469][T12542] IPVS: ftp: loaded support on port[0] = 21 03:31:03 executing program 3: clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:03 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x10, &(0x7f0000000440)={r2}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000080)={r2, 0x4, 0x1, [0xfff]}, 0xa) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 333.083036][T12669] FAT-fs (loop1): invalid media value (0xb4) [ 333.113529][T12669] FAT-fs (loop1): Can't find a valid FAT filesystem 03:31:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:03 executing program 4: mknod$loop(0x0, 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:03 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) dup(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) mount(&(0x7f0000000440)=ANY=[@ANYRESHEX, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYPTR64=&(0x7f0000000140)=ANY=[@ANYBLOB="af9eda63d64a5af845d6ace3c4a57b16896a1a02d71f7c691c139b19ddedafe2c7c812c73438916cda292c2f614c03efa0ebb85e2aab04f0fccab1ca08f0fcd74b57084285fb3aa5629f757052fa9b62db4e03f58d9bcff0e8cce9d1721de9277b8cfa3a6c4bdac80bc0885625dbaa7b0c87d1673cc81da7ff48a522dd4134b00d866b71bae41b9f27062c7244b6a5d6609656", @ANYRES64, @ANYRESOCT, @ANYRESOCT=r0, @ANYRESOCT], @ANYBLOB="a35c30993c5e348d4d0b8369a23c4bf282ca067cb000f8ff527460a17b975649113748d897b5dd6b53e1484cf8929de1bb58c1fa6d0c12c72176043698c91c050cf5c12afae625e3855c5c1e1b8a72b51093b57969c7113532eb5430711f7f033e76d9b2e79315f845d51c03535172a0ce33c90e8f193ca79541e6df7d8cb688b50a49536a26ad544a512f78bf80a5a46134fc71f040c1e796d74d3a2f82538ed6915d9529560c", @ANYRES64, @ANYRES32=r2, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB="23019b12ca60f304510c9f20942a153c51cb7e9ccf7cd335028b91815a1312ef7e44e8a1ef43b920e9086df5ea76cf02400f807053721995f79d0dd478b06d33e577b1a1301b7cba653f06dbbc43dc3a6b057a13793de1a7aa5f9fc0ba2f8ed81e1a568dd90900cb76c24bf0a93976daf44ba81a049f8358830dd7b0ff93a0162010de03eef0291671c332a6ece5e2dd2791746fc0acb75a722f13", @ANYRES64=r3, @ANYRES64=r5, @ANYPTR64, @ANYRES32, @ANYRESDEC, @ANYRESOCT, @ANYRES16, @ANYRES32=0x0, @ANYRES32]], @ANYBLOB="6b5764cd2c5224080e8808a65902e707bce7c2062dcc087e34da0fb1de757786ff77d89a19d7edceb29feaebd5cb02c2594dd904a61afc3034c1805e8cad6e1459203bb17e46c739b9f731ae550c1e87b3ab93797a513bbd8335a76ba9f6e5ff2a5f7ce5de7df31def404eace24c802d17abedd1b672c57e6a7d1d5a9233e5b6ba91ea3304bafc8837c55a8ac00bba0047e67e28ec6766fe1fd66d9e0adcfbba8a1f32ad25079e8f972acec70e408a8db2d15bbdd51aa7380ffb0d63339a01362d3704a2d74bb4c0483177b3a6109b380791", @ANYBLOB="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", @ANYRESHEX, @ANYRESHEX=r6, @ANYRESHEX, @ANYRESDEC, @ANYRESDEC=r8], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:03 executing program 3: mknod(0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:03 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x239, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$bt_sco(r2, &(0x7f0000000000)={0x1f, {0xf8, 0x4, 0x3, 0x2, 0x4, 0x12}}, 0x8) migrate_pages(0x0, 0x0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="662defc33a6cff9c9ee37d0f93e9936b4c2c4c0fbd10822d018bace9b78c68731684f133f7385dc4c5dc5e7ec4e83de0aa0504b5eaa2164aac4b0d347f11e06b009b3e1ea205b3549d112f6204fc4d493adc11e3c6d48bf5e12bd7fcb7989fc974e05ec7d7de76", 0x67}], 0x1, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}], 0x48, 0x2400440c}, 0x1) 03:31:03 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:03 executing program 3: mknod(0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:03 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0xbafeac2e74805403, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:03 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 333.548986][T12793] IPVS: ftp: loaded support on port[0] = 21 03:31:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x57, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x7}, 0x0, 0xc, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:03 executing program 4: mknod$loop(0x0, 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:04 executing program 3: mknod(0x0, 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 333.883049][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 333.906425][T12815] FAT-fs (loop5): unable to read boot sector [ 333.963634][T12809] IPVS: ftp: loaded support on port[0] = 21 [ 334.202272][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 334.214399][T12815] FAT-fs (loop5): unable to read boot sector [ 334.246866][T12809] IPVS: ftp: loaded support on port[0] = 21 03:31:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:04 executing program 4: mknod$loop(0x0, 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x129041, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f00000000c0)="0cbc8546134d471dfe99", 0xa) 03:31:04 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:04 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:04 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/tcp\x00') ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000140)={0x0, 0x0, 0x2080, {0x1000, 0x4000, 0x3}, [], "557b4c3909d8a810464f5abb5f52700b29303ccd26bac09ac9afb37f7027b466cdee32a15aa794137ea9fb2a92408d50e5c564d463d7dd0e854a4fdea7d952fb45696a688f6e1dcf7fa159ea7131f0737346fe963b2fff68b65073466dc0dc36e8cb7df45c1fd44da6987a7477fda3e43cb8f2542d32a9a2c095d0d5aac62f53f068bda04f325b6883d326988253c94c256e59868abce948d7ae85d664225f1886488088ae4a68f3e29f8970015a5ac039c629af037aa0f43b835b2ff83a4902b46d5b21abd981c027a1497fe31de5bdea5774d34c647cb6b5986964951bd44f3db9815bf5761ec2bc7836a6c257f6ae0e625c4a0a9a67accbd7530839bf91e5561bb90c6e499f933d76247c822072ab14462ebca7893ed13978c7890de9257803ef3b4c54f55bf3742454bf6566b755a00d2b9380a90220588d4c9958757f815026f2c05cc3a93206e1a41e6248da08cbdb4a1023d3be57f23068cae46ed41964262391cedd8aaa1f30e85411728c6896b330b7fde9eefba9b61f8ff944d019428114f5dc4247fcda56f95f55c9176bb51fe6d57dc387661e90cd0e6e1fd7714678949f492eb8f3a39d895625fbe21599355ea1ed3a7a920278d3617ce58585c1cad86068bd06e08547385a5c3a78d6ea7fc383ca541dec5961be6ff77eae9e4bb7152f52d911d9d83e0d4954bca2a353f894fadbb2f73fd68fba3145e6b5ef872220e46af07d3fc335781898e5eee6456d90db510c0e1fde4cecba05e3b072a00e9e87b7083a71b7f2012c49c730aca73dc9e9dcaf3b07a2797b1976660cfb2e49df702be36f8d2d39016ee45244129a78ae5aaa85921fa7a88e31fc78632f83181454e8cce305a74debc81c547afe49a0f4494c8e78535ad3af597cc5d95a56c9548b5f92fc6ca4a4e0b2cf8795b6dea65577ccba51cd462a34a039a7c55cd5208876439b920608777a3e405f924ab7450ed0ce48976e4417e4f7170131cae1172abbc1c288212a7dec4b5f1fcac13db41e05931260c776551ce2208c8d683fa81f12b625bda0c07ffa40c3c1cbd30ca53da0eb3b22e9875d15726bb4d428ecd381424543a5d9de5f00bc8b9fa6efb5b0d1245e0ae4b9c31e657152e1e7a254a08e3cb4d2cc36c027cbd0d7eba19ac914e1eaec34beef09215697481e166d662999bf5ffb72f87fd81f3e716d141a5d8b93e90b938f3b6480413b2e76379a2d53841da44a19cf95cc2410516f237876b2d5bcde279d1c7d6fd7f9b142cd7eee85ed483fa781ec78ae9215bf331b7a67825dd43461b255faf13d39274f08e5dcd167b13b76ec58afea4897e813af91372030ac4901f3853771415fad1479f770dbd6dcad59f3b79e2c6cf56aa46ac87e11ce28a4afbe31d74a0ce68f2f390c4351aafb48db0e3a1d6fb571ac37f74388267d9dd63e8cdb318d8e69609b32114ba14487cfa42ec58611b43b6d4dca6e5e4a756f7dc0d6a851b2c17da1102468b98e113ae164ea6900fb79c2abcbb8d22117245991d1bf25987f97c34f8589ed52df4433c3fd0d962e176aab53eac16a66fa247472573a48873a0a6524265d9b3d7e6ffdda88d25370dc98d9201c5c7d08be2ed629b369f71c82862af401e1c386153a8dc41898550f7f9b20c0e2ef74bcb76ecaf77aaf2365f4c8097bcb2f49c346f389b8a3eee08efb5f228b6b61a25e8b2c1236ce9594003d1b45104c4333a94b7419782c079ad2223a5eb32813c2976425226b25ac4d8a4e85e8bb44fec191d29c2dbba11b63d6b7fcdb6e25e517b298c977b69aa85565520fef187194cc63109cc03869459553abcccec8f3e5ea56597113d0671272dd6a08cc3d9e18ab858906363205e101253efd209d6cd2621dd893a44c412c61bf1cde994e3934f87a412adb7e4f727fa592c05b851a599692907f306fe5e794f44489d65f2812ad3ee83c69b8183119a888f79605ca15134c0fa2cd08be419571d54eebbb07bfb01d97fbe3a9f6e92a1ee8535d16959cabd868ff26c18308a2766516e33fd750559e5577cec56a722efc853239778fe68cd45630fe1c48de5361cf368d98c3068ff5e3a8d05c4f9e2b60254d6db433c4bae57e07524015498409a91ceca181a7014785ac64caec1224fc1d63441bd6be6643efa7d18f6ef6155414f1242b760ac2e8194a04eda2f2583fadeaf803c702cbec93bde5c22bee7c06940a7ae341ea55c52d361f6cc31eb19f49607270a76796bd54b1aae5f036b84b32258d50d67815b3c7d4dc7f5b7c49d0758d8ad1457cbc1ef7df01190b2ba30d33fb20f6b82ba437d6184ed49eab6da5a87ff724299771f8b357b9298ec082cc6a0599a72a32cfa15d498332f3284191eb97fab674dae1c842f08cb5681b82a9b5aba2e3a082ef8a1c9cc324ce1937b9e0106acd0141b74fc2c9e92500b2fa6906ea5660d42b230a44540a87ef9b4e30faa956a9f5400e4d24b9d183c646baaee750416e96f74bcf1f0ccc6bd96a5804a4cadcce90f563b9b64fa4df79107819c427de104b2082ad37785f747e4e8411b3367d8f8c19694d142b81d38337f3955bf3fa4447fbac1761ac3511c9c5c09f41f3bea2f60482baeb50a1441911a90024311bb76f68f9695a816d4c00530d70480d93b235ed2bae7c3e8a7628b0e19ce064a5fc6512e0cdbab8176a5ea07e4fda02c413dba282fea9e9e8b6e71188d8ae75bc963dd51cfafee989bf0b8fe6c1ca8aa205798c4fa7350195c55e54e75e6f84e633ea6c5422f31d6fdc27e8c114691031bc3c3615800a4c0ba80b620e7b43b77092e0ae7f9f8c2b8101561a5b82609cf02175e77733ad125cc9c8850d247ee5655e68a55ea5490862c86df065a2014566d70b41d0b3cf46cd4f747be1be1a8809b41fe593b83085140e51a80cfd4bfe9e6ef6d7f5d8de3595a753d1af544741cf40951b0f4df6e488d171ae9819e3c9a72e0901e02b1fb4ed4b5b4ece69bb2d943f49f74c07674f1b8e573d0dc663694df275d5ace8102b11db4316a721616c380abdf8d644f8812b2d6980f08f86d8686dff31ff738aa07a4358dba7135954e506fe3168b035c856acd498b0d13920e564fdd39271aca9ce79f5c3db18e757da787d8f3f177b1181f041a8255debfa562bb0a78b4c02f4377a07cbf5f50f8a07e9e8e16eec985921aa547808b7fa3adb9a2951a732f6465510c2d9e6c588f9441a544488d47c304550f10a16f8bc789cd938496ea195d6becbe3ef991b4ea3280659facced4f926a9b69ab35c1cf84550af6d734568219aa15c14c1213e8a25e729a1ae2392de9bc8443a202aafd9debc481a4693406c8684e182b5c7f6924383d2654d10037ec1fc6b6b352733398fc2435adb003560c2f959fcf57d2ee42799813f782e3616fa08f29c8275b58defcc5232746eb707a54ae645c154c82811daf68ac496020c0b14409187ae80618f7db0a80ec5400d70d6fbd7e98d50254d754ccf63decf319f6cfcc033423267a0a1066a83dbc550688aaa1234405c191f7bb3e907446041a5e961b851acff7d49ee28c6bdf17d6800f08bcdc51b62cb7d01870464ba51c7f0560a0a89bb0502afebda6a4ecbdd612f6a3a4d868867da2ac87468c6c61bf04b2e6b3a503032c7f60653d6f7ad63a5b3b75fe772679793f1736b97577c182041b012f1dce72b0d8c3d35a114e8f4b8ab2850951c6818f62fb546adf49b23d6990d53e7dce5ec5d0fb437ff607a047043b934297726dfb3d4c1b0ac965e1886b1a803daccca2d08cb0707008d06119f617f360d91c6e9d281f92e133743ccff84bc65dfd75f8152ab027b149d769150e0b0d92d88135159b5741d3578753a31b6664adcb45fc3e50474d2a79df4d1804f439e5742496905f84c8093ded363e8133f12a91b2cbde2afef6ed3d04ffe67e5db671c3997424dcda9c14f51b15df2c2ce3a16dae8ad7111bceec02b8f74eeaf9fb247bc082082ba37c4ce6bb68cf5803384cc9365480d3ce5d2ed2d96e55f67fb9b1a99a138e33694946ab5b122f5b068fed062f21b354da418760a86d07d714dddb15e3566cf4f31718e3e6cac091daa390204982f92b3c349ed880df89fb3574c4d8991c02eed7553e4be35733b1a0a43e785941f2514842f33f1fe7fb3380dccd50bfb5452eff4a8b5242fe4ad67b5b9563831a0c88eca0364b677b05384763f1ba7cdf1d4d67d67b824a0f5534d5c1c1e54cb5ce12c08dee845ade5fd3b00533049d333eb8e85b45ad5c40bdb8931e020dd07d748c24a8ef4f285eb09330974d40de354cfcd967a2369e25c098c366ceebab9f8c1bb8e51c00491beced9bea623a42b0dfaf66e8c429efab1044b9c6fe589fe6fc133c0a258aa3106e5702a45b91cff8e5778f0ceda318dd89b48d9a3fcb7992e72d16f6b426c331933e63c26c3fbd5bd8846c4a87d306c5ed0c38b48576c633816bb29abb05a1bcddb7347f7cf8a7c725a6b283c10b393fe43be1e819c8dcc59c625314c5b9221db26e269e1c65f1d280098802b86a00a1eb1635b0f99cc3708e09025a5cd9e28e88fc5b85ac5ce4137d08dd568080fea4e5950d85e1c01842af1991e7cd8323911490c81859335247f31a2eca565366e24a7a53eeb200a76ebfef295863150e7637d5acf3f71f7b6da5941e06db638cf857fc598d94c339f35ffd238ab07a9fb333cca5553f5021c13be45c8c3ca454ed37525149b5a737810026fc9061a47708af057e9f3b23ee2f4681db454712c0e191a1482c360e5cad22e36e7c49f2a3fe5ce66afe5ed8409d6fc2c92aebcf3ba25ec022052f1ac9946df452584d3fcb54afe7075c3046f9cf5f25e7fe81776d7014e0ef8149b24c279bf303e1559a7a8f3664f59392b4db6bf806ab9ac020cb5279b8fe14a54b86a5265b4b0f6261d8077900f410c6ddf32f6481201b3d42a4a31f63a0eca5f6dede3fba3c7b2f015f87a01a0ad15e7add1a30866fcf33b1da5642b4350790b27445993b5d2109753b6115cb57213f72b6ec9dbf3ab5aba614584cb23041577b3988f69235555143df92309e604b4711a25641c7d39f0dfb89f5e8088d663b8b06efd3fb714a109783b3c0e858854d53da7539e981413dbee535c0422380ac0ba063bc6b2aca956f717174c139966d1443a9a9fb4a11b3e71763961f4d39ea0978ccb827a8e62b35eb288ff9aa844071cba943d4dc17823debdc9969ad06b5cf2df6e29c2f0d892487dcc817844a1218aa319f2afff1846d770343c3ff345f0b46c3980efc5fc083525f90dd7a6a5362a75e2a92a5d3e36826c614b1b47a878d10749a161cdc20deff815b54e31de44cbd0384f23dfd86684144c2820323993a3f797c839b348855ce8cc56953526d8284f54f213d168b091727784a7b51bd02e244f59f19978e8e359d55a838dd9d3b8fb791d3e9b5d550e8c4273d23410b5f535270d3aea122308c9d86b020e79a8ed3f90a01c6c79d7679cd2e14d70a85f5c19a656341e5574b341c0a6d361ba0287946f8db71062e2268c86ece4ece59a608a2a6cd86fb8b539a4b2f3c758c890bcbb3b014b4e58b7f22227ae142602c77f2cccf40643dbcf9459ae11808e829a4ff7378bde176204a05197d1043ba596fc5cc150da749e3286cd3e9adc25d0c9fa8b5866239e72ffc26b01fb3e2aa841df714527debf213aebdd6ad1b0ee5c0815c709982159d538e4f14614ad62ccf317458f787d3939700f877a8b81595d875a5387f281e5b5554a74845c37df89ef328aa509a31a077641190276c5b412eb03147c616bb56da3331", "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"}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f0000000040)) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:04 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:04 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:04 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:05 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:05 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 334.797696][T12859] FAT-fs (loop1): invalid media value (0xb4) 03:31:05 executing program 2: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000080)) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000040)={'gretap0\x00', 0x5}) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 334.895424][T12859] FAT-fs (loop1): Can't find a valid FAT filesystem [ 335.074902][T12968] gretap0: mtu less than device minimum 03:31:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:05 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:05 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:05 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000009480)={@local, @multicast2, 0x0}, &(0x7f00000094c0)=0xc) bind$can_j1939(r1, &(0x7f0000009500)={0x1d, r2, 0x1, {0x1, 0xf0, 0x4}}, 0x18) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:05 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) r1 = inotify_init() r2 = inotify_add_watch(r1, &(0x7f0000000240)='.\x00', 0xc0000080) inotify_rm_watch(r1, r2) inotify_rm_watch(r0, r2) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 335.506555][T12986] FAT-fs (loop1): invalid media value (0xb4) [ 335.542396][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 03:31:05 executing program 2: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getresuid(&(0x7f0000001600), &(0x7f0000001700)=0x0, &(0x7f0000001680)) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x10000, 0x3, &(0x7f0000001300)=[{&(0x7f0000000140)="fa47135a5d5280e81c085c06611d9bb90d6369f172263509919b663d8c6ee4465a2b98581fd22b490b23dfd15fd747cbac79fa2e5ab6ddddc08e82a9e3338f7eabea4504826b0079f02b53427e5bfaf789584f5a68518d0be50157aa7232408104b67643e1a03a4ab96fa965318b755c2c142f4e51f0187c595c1f890424f6c66935065ce77d2b5a2f156161fa97c2a20055cdb919b5d0c62a2f771854cfd00132cf81a68da91a68f8907775041a67b19a", 0xb1, 0xffff}, {&(0x7f0000000200)="e925d57bbf96787946733fdd486a981e3d8f2c22fe850e82d2089641eaf3c6a5a6b5971b821ceed149725d60162791b1d27ce14db63ad0100f48ffc04608a4112c951f023c3e851af212ef8e89422ad503e38b64a17387d89e7f459e538c0c1503998e2efa674d37d792da3820206e7f2334bf031677e267f50b0cb18e228b751d75ec05ba21174626d6a7b170dfa1e04de9284628bd0a2232828d58dcf094d249f9355cfd26cfa580ec0bb061e38f968928a690b1f3ff6547e7effcd69701cafdf8b30e38776a03b68da7fe77c9b23733c5998bda19bfbcf7691d76aeddbfadbc94f61211c2", 0xe6, 0x6}, {&(0x7f0000000300)="68ff788821eed9805b753c34b2fb1f74fbfd35bc248bc1040f4863d984b06f6fecc404b4c11cd189a8fe87303e0a0f1d033ee45f44bd9e54e636b98ca26c7a20efa4648afa6522b00afc9dec9e25b3552b73722937002c507539951b1cc8528898d2934c84e693caa09cc92848f9f422f4a12261918dfbbc8c4e7a10b5d6b29cc7553dc9dc7ec8d2423bb7739321742a0411fbf9c9f5060847b51a6e93c322dfcdcbac8fbb5b51187a7783efb38ea209c787d2ba69d070f723041d7d8fd50e40f8f9f1d9ab16d0150b8a3997f21340b9f37ff6d416968bd70c1e97bd67ba1b46e1bae09c5ccffbdae5f06532114484db385734e016f9280a860404c07ad41df09f0912f03bf0f00a9a1b1acd3ae61a9ab56a5722fb542f5b8511ec80155335692e6ba69beeaf001d312478b22b74c9ecc849e38eb9e51398f2de05e417bb35694c199f455adb8040553c0472a6583d404a1f1b7ddeca3524e2da7e437948401b4ebceae72e5167ddea5b34ae01acbfe04d7fbbb922ffa629421ae23d6725425fbb12deb28eb38b80ca0e2182a6f6c0a5626dfcf361f700e4c0148429d0f4389bbcb5e478da16ab41d857c5636d53092a83def841afbd98909d946a95df4217e5349c8ab546cd72e37ffba29dc22e289a4d0efc8a67d91137624261cb712a34612873a22a9419ad03ba7313a3ca19483ed157d85588628a1df22b173bdac2b4647c18a41e085c22e614a936874dd2b00e8471530b2598ed17d9409b07d8ea48fe2a4cf380c98c05225aea59d4701229cd6af8699f4efce8788835db055929eb929eff7ca92844c02c57afd56e028e6a1328fad6333c6ded430cc70d99ff3628a640c3a83d6bb84b919a1f0e303f98bd3c1884780f73f05677264e35b95e701caba552337dd5f3894f28ca4a21477742459d9f7223702c0872b7849bc4ee2016b04ac7f7f75984a70ae15e00234f8449630f2edf1b780766217b6d73e12bc0dca2fd162b7c284387382d67bdb28fd3640c8657fe1c424189ff32f90c577375caf0f08bd8d9082fac547319b5f5ece5553973246c6b209b22f4b9d5e1a766ecf815097de793b0da7a0494751bcbc97dcc7beb4ed30def795445ea3126c65d5c13a908764afe22f5adf8a112d78e1b19a43b7d2120091755631141f2a8c18e8b580b874b94c66f49d6cd69ed67ec4ade0423e9d3df92a2514e46315c6f5043207e091d3bea11232d77875e2694487f19d0dd1097e6a4929a13d0a2869f24847402eba7bf1f66be740d879c9e00602d285ce5f489e1ec63e98c7c2d2daf62dd7ce08f5f3ce5ccfef06d5daebbf6421c2b6161d06644d6c18ea98ae45fa27a6b8f9f9820fa160e6cdfe4517db01b748eeba02921b8cf4e7ccf6cca5210a424d8d1331f1f65098ccfcec2540e547bb24d331b2c5eec7e3ad008146d68f74386e9258112ee579c4781cbddfa4c7e384ffb6f177bf402bf9651486b1799ff0bfa0de1620118750419db625dd3418ccee9f486f660b80500b2d8332d103b03de49b9507bcdae1f4bb423c4581d85559572dad6c92a6260a01d28fa66c9f8802842afff42813c8ef1e8efc43763ef68e4bd22f42e037b70470faa114450c7f92e6d33c717fb290317af3098bd6dbafc5a0f36ad416de3105f6e63a6ed96bc77a45a8a19bafbe4713209302315e32b039cb1f04790098935702139eb347925bc55f57844d2a12478a3b08e0c2043a9f390e11328cbb81c98098afec3570aa0b2697ae4ab96467c5436a541051e94949d31eb9b1b17d0bf91887ab9d8407ad8a9196ad364e465f456e3d7bf7813f5cb691a930b33889141cd73144ee8ed5868bf60640fd71214921f7ee7dad981987f56b29bce71ede9581691475b656190cd4de4425fbe76e7eb90de09e28487a02af1f8ca2e0f89eef11a8a6c5045b911f267fcfc5ed2ecd3a749f451f7a2fefb3e134bf2bf7b7b2ed0109ce16244092195162e4119359d3779c56f6905580ae6639f884a86d702941c4a0d2e0594aafe6062bde89b8eb8c9b878d6ceb83a7356832364ee388e3da4cec403d45a7f6a473f9a53dfd16e50ad447347934eb07392a0b904d40f4922e2390a1c364ba2ddc3ca49171455151373783cffc8fe0c4af4a8a01397a241908bcf5d40998ecd824cc144ff0e687caa770da45e876b2635ee36cfec359635c5b4cc382da5666802f7546de38623abcba98b57dce0f4333a6a098433ef50b00133cd626dfbb746a3d4a9237b8a6c02910c4e62a361151eba70e449ff32767aebd5d369cbaf12f6f1f0976e78e2efb02178468e610c382d4005902bb6f76c754ee0d567e0459a62ba98fa490e58d3217d93a4d42a7843bf184aae63ff23c71096563c7a78479d326845ea41e8419a01a4b1b468ff30f35db22f53f5d597bf64b91a2a5895fec81f036cd6ac6613ee7b107933c0adf39991e259af235876d3ff72cb1e8b83f1a593013b8ccf27389c27444ce551b94dce080f97bf24594ec19782f783d7aa636eeca2066c4cfa9db05d3c75fc016771bda4b1ad4f5ef5ef56f98534ac7dc697729f9f5aab8bc5647a68d6e92d70e8bbb286acacebe54ef6aeee63e84294e2daa34c3eda1d72ff189ae6f67d870307af01d5db3871da0f17a684d2509dd7dc5c395598931afeb3d3965ae0df2bb7418b2725ebbd59b201831578416246b9a2b0f52586a8c4f090c6ce7e8ae100544fba1e1bfa39efade4ddcac00bd5aa361b85dea550e59893a65fe23ef782e71a845acc25d29336e20c175124f096cb3fd44f75ac6fa4974ff2346aac3760641ea98da1c71a4280229e258f69a9e08acfa10f37a3b3776fde6571ac7137ec918df58849af7a65da1419ad109fbb6196f27fbfe1780770fa7d0df4dd7a613a6f5aa5629ee242252ad03b332cee010a3900d6c1f027ebf147a33dc65ea7a7c9a8f3111448e5313f14b060d4ad9d4a10f349a6345e8f4977f503f9a40cc162dc24425de1e6ed40e77b300aa1592a72c5dbc89d967d83219d7c70e9789350fbe0f4fb5e47826f44cf6206344a085b0fad18585da7f42a1d402a3d39242ee122cdba229997e32f908f2df8dfe076cfb257436e4f0601c2efa45c6b3751df5ccd5a374e9831a49815342e98c51cdace13cbecb2c99751be156a01afc5fcc8729c36242d4b0c7cb6b1ffd04d475eaab88d0dc8446343ef5b5f158c8e7b72470cfd4eb5b448e5cf4fee62db6f022c8142c773660ad492bab2f464a7c356b4afb45070ca9523731c93a85a65cf14cd5996948c9305596d81a24f19d290e329ae3c6735cbe7f36f53d2809b159f1911c6d073c5552be5b6a84a20be0e3be8fcfbf2e93061ad97753c6e27089c4e51bb3c8eb9e5b3cea5cbcd88f4ac3476cdbbff96a06fc742395a3a2e3071fb715f40711984a85eba93d0e622caf05a276aafb3df443c1d01140f2da0d609267933e71392c964629cfc3de3210aad022c1079c76c4d3a5b4b1d51dcdcfa607e6b82ddd6b1ac6b3114aad2863d2b2f33e26b5b77bbad3e832d3df1bc3d7b6f1d0232db750ad5e3f0c7dd4132035e76ef611415dc349a8d6117ff825fea944fc2716b453352e2a884d139268b1f3586f581cee46a79c4ae8deb64a1b78c452b47b4daa7d9a04b1caf9ee5991f8c383faa57037f7990f7f9aa3d92fa359ce4cf3b71b67393581df1056df62b13074af0797a11c582fdbd05534ab42f6522b0fbd228e9f89cb7538023e16c79ed44de2185a9422e359ec92840583144ae0fae1e7c6fa9faa901a1d96f9d042981262078153838bee718e22c9c6fcfdcb61861dfa0bafb174cfeef3885c335729f7618cc0c201d40a9756eeea6bf7de32a240885dd0cce6aa43a322802f8e19bd4fe7977d168e4162ed292a1678f5b2d41cb0c8e35672d74b68668c696e0d4311bda7da6ac562661bc97d790058a5ec170c2928b6fcf418ae58e8bddfcb11e00444f8ef0bafac24aa200ac1af61c02debfa054631eba9ea8b37d44b1615782b55fcdf746da0cb0a31a76d76f49faab624fd18c098df1b6ad38079ebf3d0e81815595b2705db7e3fd7f91a7d3a54d52c57a0169265f7ba693084a70230f28dc6ee15a8757be29dc99aded271d154754890d969e43f19a779bc5ca2a5d2e99c6b3e6fd2981af6099583711366cc0630d58fc02c135182f4aff8f5bde385881267826d7d6701a89b7f70a362e50e51d3872e0c67fb41a5ddb5acf625a21bd4c8b4b6b1fd13cfbabc7cd0044a9f96b3c531cca056f74e930a8552fb37af05cfa60424f0cbb67b5a016e053fbc285c7abf001d2f1e3a41fe03d39f486fb392c02c742e37b6f94b87f4808f732c9e7281902fadc3eaf0d5c3dd899fc4e6cdd2ea1ee891bebd087468a16156360bcc8de9e483ff3da3c14490de725adf059c736273cdd65ae487c6aa10793e2d295ffd73c90e06ce9e474e1c9fc164f62392ba4df74dde4af875fa72e60110ccdf9fe0f73c993fb2685ce0c99d1b53af909d7bcfbe0741545d6499bf51af12cbcc3d49ac093fc4fcacc64f265d42db154023bd9b78e215f47f23baf29f5cdfc4c6031820cb08c9bd6d3a999048254ae5eb65231519626b6bee8045e5d8c11f8988b9b7aee90395a1a3d4daca5a571cea11e19976f65d443ea7d85ad21ef906e12e016602cd7175ab1eb5c22b1b862de43334849fc1d8f78eabeefc43d20e7ae6274a1f9aae5f266eb014ca186eaed432a5bcbdf0ab4d6f856b580754053066b8ef0d36d8ace3055287906ee73fecc9ccb2653a8b3d063197181e86a6f6fa4bd84805e5295e9ada0f73ab74bac2cec216eaf91b0f63dd52ffada9f6fa4139f17fc7c3048a7be337e3813a61a46d6138f517e5a5591292861f26d60dbbc3cec2b116853d2685d2f46a14f633a51a252f8cb7c01e31c42e891013b2a1cd56254be5828a8892c7d0922c96d52b756bcfd176d706f595e7b92e7222e91d2769e3041d67bcc9986dba3bd5502d99fd5f951dc22f6b93441a17636839bedae46fddc82040edf7da5c762d7041f96b4f8207feb4c4a399887a4fdee312206e5d9a8c2990d941965826ffd56f79ed84da098ef4a098431ed84f551113728fcf86953eb31ec24c70732267fdc68cb9eb11e9683bae57f4ccececc1d3c108f2ea6045452c85e51eefe99b5a355fd15a1c9a8a9632bb8bead6119d7cc280f8cf23794b5241eeb55d8aab3f01a14df0737dc473d10ed83daaad13630d91e4fc05a30305c3a744c195df99dd01c039d07b66ec2e2eadc85d99f7b0e46c2dd8e1db90541e584248dca543e74fcaed275761cf318ebb2b6f783cc88fd0a62b9aa2815801768c9cb106b7fe322f277b86df13a2ba42cd8294bad38c77afbf0e9939e9eceb9c6260ea0f7917ac73ef04103e88d538273af318540e7960bc627aac940cfc0aac51dcb4c7dcd4648133fd4c1dabb0a682e57204f60c66bfba825bc3efcfc36dab19088d5a5ff207ebd506c4f85d5a29dda218c5006bc366d07696959ee78c0a1af04969bfce078a5e527cf276db1df5f673295fca69aea1b292d8d13edd9deea8f58c69f5ab757460b3eb8295c2d782181f84e7ab635e25f89e970c9607d78304ea89fde5648349f6785019755aece2efdf8059b9fc110ca01ea8d84867126dd679f6f5ce42b3464bbe6ba18466965312d06f3d41e7b4a7b492ca8ad14e6c107b702af3227cc734630889bcd50435b572bf81a496bc1110d4b536a26cdccf7689057e9919e7fa124a9419238f7d8f0710cbef18ba1daadbdb0cff27c2d0463b5d73107592ec9", 0x1000, 0x7fffffff}], 0x1000000, &(0x7f0000001440)={[{@lockproto_dlm='lockproto=dlm'}, {@suiddir='suiddir'}, {@quota_on='quota=on'}, {@quota_on='quota=on'}, {@ignore_local_fs='ignore_local_fs'}, {@quota_quantum={'quota_quantum', 0x3d, 0x5a6c0c71}}, {@meta='meta'}, {@barrier='barrier'}, {@suiddir='suiddir'}], [{@measure='measure'}, {@seclabel='seclabel'}, {@fsmagic={'fsmagic', 0x3d, 0x10000}}, {@fsuuid={'fsuuid', 0x3d, {[0x18, 0x19, 0x30, 0x30, 0x34, 0x32, 0x64, 0x31], 0x2d, [0x63, 0x66, 0x62, 0x5b], 0x2d, [0x36, 0x37, 0x3b, 0x66], 0x2d, [0x64, 0x36, 0x31, 0xf9254a9df9e480c9], 0x2d, [0x33, 0x66, 0x64, 0x63, 0x36, 0x61, 0x38, 0x61]}}}, {@subj_user={'subj_user', 0x3d, 'msdos\x00'}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r0}}, {@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_role={'obj_role'}}]}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 335.556429][T12989] FAT-fs (loop5): unable to read boot sector [ 335.575111][T12986] FAT-fs (loop1): Can't find a valid FAT filesystem 03:31:05 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 335.637355][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 335.654563][T12991] FAT-fs (loop5): unable to read boot sector 03:31:06 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:06 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x200) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f00000000c0)=0x3) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 335.800430][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 335.815547][T13110] FAT-fs (loop9): unable to read boot sector 03:31:06 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 335.931579][T13120] FAT-fs (loop1): invalid media value (0xb4) [ 335.975161][T13120] FAT-fs (loop1): Can't find a valid FAT filesystem 03:31:06 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:06 executing program 2: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x10, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:06 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x9, 0x800, 0x36) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x70d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) r5 = dup2(r1, r1) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, r4, 0x1}, 0xc) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:06 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:06 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 336.474247][T13235] FAT-fs (loop1): invalid media value (0xb4) [ 336.500158][T13235] FAT-fs (loop1): Can't find a valid FAT filesystem 03:31:06 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = socket(0xa, 0x2, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="9a8b9cc55e2e90068606e9dc073b45729b7268c1381cf46aec6b07cc35d28134e817a0ebe4bb91db63ab11e951fe944269f93758d0e01876761c182b7c41dc169cbc6160033ec6a441ce9ae069075a9556551c26858945e4d865277ed488fa5834fc7aef29b346ee7b8d349ca157ca09295b162597c58389dc4f", 0x7a, 0x3}], 0x200040, &(0x7f0000000400)={[{@dots='dots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@nodots='nodots'}, {@fat=@nocase='nocase'}, {@nodots='nodots'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@obj_role={'obj_role', 0x3d, 'vboxnet1selinux-\'eth1'}}, {@obj_role={'obj_role', 0x3d, 'msdos\x00'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0xfaf}}, {@subj_user={'subj_user', 0x3d, 'cachetag'}}]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r1) r2 = socket(0xa, 0x2, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r4) open_tree(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x27d21, &(0x7f0000000340)={'trans=unix,', {[{@fscache='fscache'}, {@loose='loose'}, {@version_L='version=9p2000.L'}, {@cachetag={'cachetag', 0x3d, 'msdos\x00'}}, {@access_uid={'access', 0x3d, r1}}, {@access_uid={'access', 0x3d, r4}}], [{@dont_measure='dont_measure'}, {@context={'context', 0x3d, 'staff_u'}}, {@obj_type={'obj_type', 0x3d, 'trans=unix,'}}]}}) [ 336.529624][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 336.553235][T13240] FAT-fs (loop9): unable to read boot sector 03:31:07 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 336.679177][T13343] FAT-fs (loop5): unable to read boot sector 03:31:07 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:07 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 336.759387][T13250] bond1 (unregistering): Released all slaves 03:31:07 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0x2710, @host}, 0x10, 0x80800) accept(r0, 0x0, &(0x7f0000000240)) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000040)={0x2, 0x5}, 0x2) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x400, 0x300}]}, 0xc, 0x3) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:07 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 336.985953][ T2506] print_req_error: 1 callbacks suppressed [ 336.985970][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 337.003373][T13370] FAT-fs (loop9): unable to read boot sector [ 337.014396][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 337.020331][T13374] FAT-fs (loop1): invalid media value (0xb4) [ 337.029108][T13376] FAT-fs (loop5): unable to read boot sector [ 337.039575][T13367] cgroup: fork rejected by pids controller in /syz4 [ 337.070794][T13374] FAT-fs (loop1): Can't find a valid FAT filesystem 03:31:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:07 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:07 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_IOCTL(r1, &(0x7f0000000000)={0x20, 0x0, 0x6, {0x1ff, 0x0, 0x8, 0x7}}, 0x20) 03:31:07 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:07 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x800, 0x10000) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000080)={0x8001, 0x4, 0x7, 0x0, 0x18, 0x8, 0xe5, 0x7f, 0x100, 0xffff0001, 0x5, 0xb071}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:07 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:07 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 337.672077][T13605] FAT-fs (loop1): invalid media value (0xb4) [ 337.716298][T13605] FAT-fs (loop1): Can't find a valid FAT filesystem [ 337.741051][T13604] IPVS: ftp: loaded support on port[0] = 21 03:31:08 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone3(&(0x7f0000000300)={0x0, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140)=0x0, 0x13, 0x0, &(0x7f0000000180)=""/116, 0x74, &(0x7f0000000200)=""/206}, 0x40) r1 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r0, r1, 0x10, &(0x7f0000000340)={0x2a, 0x1, 0x54d}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:08 executing program 0: llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:08 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:08 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:08 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0xffffffffffffff24, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, r0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) r6 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x10, &(0x7f0000000440)={r7}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000080)={r7, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000000)={r7, 0x7fff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r8, @in6={{0xa, 0x4e20, 0x1f, @rand_addr="2ced6a76a1e4e842d478d3014d9f26d4", 0x5}}}, &(0x7f0000000100)=0x84) shutdown(r2, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r11, 0x6, 0x6, &(0x7f00000002c0), 0x4) r12 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$PIO_UNIMAPCLR(r12, 0x4b68, &(0x7f0000000140)={0xfe1e, 0x9, 0x1}) [ 338.060994][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 338.072394][T13728] FAT-fs (loop5): unable to read boot sector [ 338.152120][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 338.165244][T13729] FAT-fs (loop5): unable to read boot sector 03:31:08 executing program 0: llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:08 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], 0x0, &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:08 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x1) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{r1, r2/1000+30000}}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup3(r6, 0xffffffffffffffff, 0x87f8d93e1bde5d12) ioctl$VHOST_VSOCK_SET_RUNNING(r7, 0x4004af61, &(0x7f0000000200)) inotify_add_watch(r4, &(0x7f00000001c0)='./file0\x00', 0x1000202) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:08 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) [ 338.353350][T13749] IPVS: ftp: loaded support on port[0] = 21 [ 338.452428][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 338.472740][T13761] FAT-fs (loop5): unable to read boot sector 03:31:08 executing program 0: llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:08 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], 0x0, &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@remote, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) 03:31:08 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x24100, 0x108) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000140)={r3, 0x1000, "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"}, &(0x7f0000000080)=0x1008) 03:31:09 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], 0x0, &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 338.739750][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 338.755489][T13783] FAT-fs (loop5): unable to read boot sector 03:31:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:09 executing program 0: mknod$loop(0x0, 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$inet_sctp(r1, &(0x7f0000000000), 0x0, 0x8800) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:09 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:09 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x4020902, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 339.108331][T13805] IPVS: ftp: loaded support on port[0] = 21 [ 339.137641][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.150030][T13807] FAT-fs (loop5): unable to read boot sector [ 339.219172][ T2507] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 339.236288][T13813] FAT-fs (loop5): unable to read boot sector 03:31:09 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:09 executing program 0: mknod$loop(0x0, 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x200, 0x0, 0x5, 0xd, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x10) r1 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000300)=0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000340)={r1, r3}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$DRM_IOCTL_UNLOCK(r5, 0x4008642b, &(0x7f0000000000)={0x0, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_GET_ACCESS_COUNT(r5, 0x2289, &(0x7f0000000200)) mkdirat(r5, &(0x7f00000000c0)='./file0\x00', 0x106) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0xb177e8d8d467434e, 0x0) ioctl$ASHMEM_SET_PROT_MASK(r6, 0x40087705, &(0x7f00000003c0)={0xcb24, 0x7534}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f00000001c0)={0x990000, 0x1, 0x5d, [], &(0x7f0000000140)={0xa2f973a2c08db341, 0x200, [], @string=&(0x7f0000000100)=0x6}}) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:09 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:09 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) truncate(&(0x7f0000000140)='./file0\x00', 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f0000000040)=ANY=[@ANYRES32, @ANYRESOCT=r1, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYRES32=0x0], @ANYRES32=0x0], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:09 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:09 executing program 0: mknod$loop(0x0, 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:09 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:09 executing program 1: r0 = msgget$private(0x0, 0xc0) msgctl$IPC_INFO(r0, 0x3, &(0x7f00000000c0)=""/230) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000001c0)={0x0, 0x70, 0x9, 0x2, 0x1, 0xff, 0x0, 0x4fa, 0x808b, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8000, 0x2, @perf_config_ext={0x0, 0x21}, 0x24, 0x20, 0x6, 0x0, 0x967, 0xfff, 0x8000}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000280)={0x2d4, r3, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x20}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8c2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6ce}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffff8}]}, @TIPC_NLA_LINK={0x98, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}]}, @TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x5, @mcast2, 0x9}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x542, @remote, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x1000, @rand_addr="0b435cdce1cc75976abe5838c4be0518", 0xffff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}, @TIPC_NLA_MEDIA={0xac, 0x5, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x4004880}, 0x2004100) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:09 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x20002, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x24b34f28e38e38b9}, 0xc, &(0x7f0000000480)={&(0x7f0000000200)={0x26c, 0x5, 0x8, 0x200, 0x70bd29, 0x25dfdbfe, {0xa, 0x0, 0x9}, [@nested={0x258, 0x7f, [@generic="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", @generic="aa9f3d0b63fc9af2627ce191c7688b8f81d6516008f0e5c8d5e844938de4d4ffa72b24fb5e035fce7bf35968e78f948f1808841589c0d4042365410abe26ef29430cff40c8aaa63e14b548c59c79c014bf2b014ce6f45af48c08e8f56287ed31c5619a714c655a9f", @typed={0x8, 0x5f, @ipv4=@remote}, @generic="8b4c2f7f4c57a277600fbd0cd205c59dd43ee69273abcf8e9869b735dd76c5715def8ff9d655938390f1420aa38372bc484f4616f0f46a58681ac680e272dc836bb4c8da32e9c16724d26643ba5843185b0ec1f99e186dbc6e8a855b34a05e650304b8516e25466da52dd1cf5d6f8639a183c5a1b2b236748b5ffa72a1f205432b0bf3a2652543ca4e3e5b67a573167f613618766afd2455ffe140f72d8f65e080d0e0234a5d827f76c5b88c7c499d2f09ccd899f5b3e625032df86d3d25361b1215ae4fbfb05d9783974ee0c2e80238dceb1beb314ad7e3fec12c8ae72b4fac0ad870ad95"]}]}, 0x26c}, 0x1, 0x0, 0x0, 0x800}, 0x40000) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000040)) [ 339.686945][T13946] IPVS: ftp: loaded support on port[0] = 21 03:31:10 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:10 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socket(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, r1, 0x0) r2 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setgroups(0x2, &(0x7f0000000180)=[r3, 0x0]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) getgroups(0x3, &(0x7f0000000140)=[0xee01, 0xee00, 0xee01]) r6 = getegid() r7 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xa) setresgid(0x0, r8, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x9, &(0x7f0000000240)=[r1, r3, r4, r5, 0x0, r6, r8, r9, 0xee01]) [ 339.988579][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 340.001592][T14068] FAT-fs (loop5): unable to read boot sector [ 340.057960][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 340.070372][T14073] FAT-fs (loop5): unable to read boot sector 03:31:10 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:10 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(0x0, 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:10 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:10 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000080)='msdos\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) mount(&(0x7f0000000040)=ANY=[@ANYRES16=0x0, @ANYRESDEC=r2, @ANYRES64=r0, @ANYRES64=r5, @ANYRES32=0x0, @ANYRES32], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:10 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 340.334478][T14187] FAT-fs (loop9): unable to read boot sector [ 340.354242][T14189] IPVS: ftp: loaded support on port[0] = 21 03:31:10 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:10 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:10 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(0x0, 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:10 executing program 1: r0 = msgget(0x1, 0x40) r1 = msgget$private(0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x1402, 0x0) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000480)='/dev/radio#\x00', 0x2, 0x2) msgctl$IPC_RMID(r0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f0000000440)={0x13, 0x10, 0xfa00, {&(0x7f00000001c0), r8, 0x2}}, 0x18) open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x10c) 03:31:10 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r0, &(0x7f0000000340)=[{{&(0x7f0000000040)=@generic, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=""/60, 0x3c}, {&(0x7f0000000180)=""/82, 0x52}, {&(0x7f0000000200)=""/4, 0x4}], 0x3, &(0x7f0000000280)=""/144, 0x90}, 0xf16}], 0x1, 0x10000, &(0x7f0000000380)={0x77359400}) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) [ 340.620064][T14206] FAT-fs (loop9): unable to read boot sector 03:31:11 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(0x0, 0x6, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 340.751904][T14218] FAT-fs (loop5): unable to read boot sector [ 340.773507][T14220] FAT-fs (loop5): unable to read boot sector [ 340.882274][T14226] FAT-fs (loop9): unable to read boot sector 03:31:11 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:11 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(0x0, &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x10, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:11 executing program 2: clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:11 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:11 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)={{0x77359400}, {r1, r2/1000+30000}}, 0x80) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) mount(&(0x7f0000000200)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES64=r7], @ANYRESHEX=r4, @ANYRESDEC=r5, @ANYRES64=r6], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0xc, 0x0) [ 341.234137][T14242] FAT-fs (loop1): invalid media value (0xb4) [ 341.260082][T14245] FAT-fs (loop9): unable to read boot sector [ 341.278157][T14243] IPVS: ftp: loaded support on port[0] = 21 [ 341.288592][T14242] FAT-fs (loop1): Can't find a valid FAT filesystem 03:31:11 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:11 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:11 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x2, 0x100) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x1000}, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r2) r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r3) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x10, &(0x7f00000001c0)=ANY=[@ANYRES32=r4, @ANYBLOB="00f900000090f4d464124248efe534ff5f"], &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={r4, 0x4, 0x1, [0xfff]}, 0xa) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r5) r6 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x10, &(0x7f0000000440)={r7}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000080)={r7, 0x4, 0x1, [0xfff]}, 0xa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={r7, 0x97, "6dc3e6a0920371c4a013d6762d8451be8a39a9cc8c6747d48cf5f4dffd7b602609f10af2a1bb31c70d42158a621be2dbcd5f6b05dcd90bf364215ab976846704b64b342be1064b93672dfdb3437c93c8452fd4c8b39db990f9fbcc35709684677eedef2bfb6b460c032d6a054e83f2c93f627f3026d8fb9bfff0ef60741a6b4bfbdb50eab4e3629adcb5edbdacfc474bb2ad935f94aece"}, &(0x7f0000000000)=0x9f) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r8, 0x5}, 0x8) 03:31:11 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(0x0, &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:11 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:11 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) [ 341.592942][T14368] FAT-fs (loop9): unable to read boot sector 03:31:12 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x0, 0x404040) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 341.694166][T14378] FAT-fs (loop1): invalid media value (0xb4) [ 341.713820][T14377] IPVS: ftp: loaded support on port[0] = 21 [ 341.727840][T14374] FAT-fs (loop5): unable to read boot sector [ 341.727993][T14386] cgroup: fork rejected by pids controller in /syz2 [ 341.740749][T14378] FAT-fs (loop1): Can't find a valid FAT filesystem 03:31:12 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x40000) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0, 0x3ff}, 0x8) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:12 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 341.798879][T14381] FAT-fs (loop5): unable to read boot sector 03:31:12 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) modify_ldt$write(0x1, &(0x7f00000000c0)={0x4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, 0x1, 0x0, 0x1}, 0x10) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x3, 0xff, 0x8001, 0x7, 0x100, 0xffffffffffffffff, 0x3, [], 0x0, r1, 0x5, 0x5}, 0x3c) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='\xedsdos\x00G \xc1A\xf4\x13\xfd\xc2\x99g\xf2\xb8`\xe9\r\xe0\xf6\\\xd1\as\v\x9f\xe4\xce\x04\xe4E\x83\xe6\x8d\xea\v\xf4\x89\x00\x1e\xdf;\xdd[\xe8\x12\xeb\xd7\x1a\xf0\xb1\x06(\xf9\x8a\x8c\xab?\xaf\xab\xa7\x19\x024\xd2B\xdd\xbb\xf1\xbe~\x90\xfc\a\x9e\xbf:\x10\x800\\l.\xa7\xd0\x00R[\xee\x1bD\x94\x81oZ\x14 \x18\x10\x82\xbe\xd6\xb9\x1d\xbfI\xee\xb1\xa8\xf2\xde\xd4\x9d\xbem\"\xc9\x96v\xa67A\xaf\x89\xe7', 0xcecda84b14635d09, 0x0) [ 341.880431][T14472] FAT-fs (loop9): unable to read boot sector 03:31:12 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(0x0, &(0x7f0000000300)=""/155, 0x9b) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) 03:31:12 executing program 2: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6000, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) 03:31:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x4000, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x40}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x10001}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x388a}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x62, 0x37, 0x61, 0x45207ba656626ed3, 0x39, 0x61, 0x26], 0x2d, [0xd0b2c1cf99658adf, 0x64, 0x60, 0x36], 0x2d, [0x38, 0x34, 0x66], 0x2d, [0x0, 0x35, 0x39, 0x61], 0x2d, [0x34, 0x63, 0x39, 0x65, 0x36, 0x6b, 0x61, 0x63]}}}, {@dont_hash='dont_hash'}, {@fsname={'fsname', 0x3d, '/dev/swradio#\x00'}}, {@fsname={'fsname', 0x3d, '/dev/swradio#\x00'}}, {@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x32, 0x34, 0x34, 0x35, 0x36, 0x34, 0x35], 0x2d, [0x61, 0x32, 0x39, 0xc8], 0x2d, [0x38, 0x66, 0x63, 0x65], 0x2d, [0x32, 0x2a, 0x39, 0x30], 0x2d, [0x35, 0x61, 0x0, 0x36, 0x62, 0x39, 0x32, 0x31]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'GPL*(!}#'}}]}) migrate_pages(0x0, 0x1, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r2, 0x4) 03:31:12 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 342.102119][T14644] FAT-fs (loop1): invalid media value (0xb4) 03:31:12 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) [ 342.167746][T14644] FAT-fs (loop1): Can't find a valid FAT filesystem 03:31:12 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 342.285295][ T2507] print_req_error: 10 callbacks suppressed [ 342.285312][ T2507] blk_update_request: I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 342.306500][T14733] FAT-fs (loop4): unable to read boot sector [ 342.310104][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 342.324838][T14711] FAT-fs (loop9): unable to read boot sector 03:31:12 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 342.511938][T14945] FAT-fs (loop1): invalid media value (0xb4) [ 342.535269][T14945] FAT-fs (loop1): Can't find a valid FAT filesystem 03:31:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)={'raw\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000100)=0x54) 03:31:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f00000000c0)=0x8) migrate_pages(0x0, 0x0, 0x0, 0x0) 03:31:13 executing program 2: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000380)='/\x00', 0x10200, 0x0) r1 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="92", 0x1, 0xfffffffffffffffc) keyctl$setperm(0x5, r1, 0x0) keyctl$get_security(0x11, r1, 0x0, 0x0) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000440)="097c2ac16eaa5de48cd3a2efe54312dfbe5dc1b32fec347d70012b977c1f2ceb1a052e92111dd9b1e2e9428759f6d07457d20f864fbc93cdfc7ea9f9a0bf0fbc2fc206da40b15772a2f60099aa1bc0c3c84fd6e64f71631ce4f515e1e70e62f8be7fd94c228545d0c5e9fd31b59fcc5680", 0x71, r1) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x100002, 0x0) r3 = dup(r2) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000140)=0x4) r4 = syz_open_dev$swradio(&(0x7f00000003c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r6, 0xc0096616, &(0x7f0000000340)=ANY=[@ANYBLOB="060000003e986a4800"/18]) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f0000000040)={[{0x1, 0x1000, 0x0, 0x5, 0x9, 0x4, 0xff, 0x80, 0x8, 0x4, 0x2, 0x4, 0xfffffffffffffff8}, {0x1, 0x4, 0x9, 0x8, 0x5, 0x81, 0x7f, 0x0, 0x41, 0x6, 0x9, 0xf8, 0x1}, {0x28, 0x401, 0x17, 0x1, 0x3, 0x0, 0x7, 0x3f, 0x8, 0x7, 0x6, 0x8, 0x9}], 0x9}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='exfat\x00', 0x0, 0x0) 03:31:13 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x10, &(0x7f0000000440)={r1}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={r1, 0x4, 0x1, [0xfff]}, 0xa) fcntl$getown(0xffffffffffffffff, 0x9) 03:31:13 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) 03:31:13 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x404040) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuacct.usage_sys\x00\xc7\xec\xac\xd9&{\x0f\x96\xad\xd1\x8fl![\x8f\xb9\f\xca\x1d\xc2{\xee\xb7\x03K\x0f\xa6\xaa;\xf6\x89\xf7b^\xa5\xafI\r\xc4\x9f\v\xf2\x1c\xdc\xddp2\xb7\xbb\x1b\xfev\xea\xed\xe0\xaa\xe8\xceR`\xbb\xf2\xed;pC\x19\xbfn\x16\xaa\x199\xfe.Q\xebvB\xd2\x19&l?\x87\x17H\x1f.\xdbA\x1b\xafz\xe3\xdc};*\xec\xfe\xfa\xfb/\x18g\x80y\xfe\x89', 0x26e1, 0x0) close(r1) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') close(r2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x10, &(0x7f0000000440)={r3}, &(0x7f0000000480)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000080)={r3, 0x4, 0x1, [0xfff]}, 0xa) r4 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000580)={0x1, [0x0]}) fcntl$getown(0xffffffffffffffff, 0x9) write$RDMA_USER_CM_CMD_RESOLVE_IP(r5, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0x6000000, 0x0, 0x0, @rand_addr="0ba9cfcb0a95570fad18d4b835de7d30"}, {0xa, 0x0, 0x0, @mcast1}}}, 0x48) write$RDMA_USER_CM_CMD_BIND(r4, &(0x7f0000000140)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @in={0x2, 0x4e24, @loopback}}}, 0x90) [ 342.862636][ T2506] blk_update_request: I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 342.875360][T15098] FAT-fs (loop9): unable to read boot sector [ 342.896695][T15103] FAT-fs (loop1): invalid media value (0xb4) [ 342.911552][T15099] [EXFAT] trying to mount... [ 342.934756][T15103] FAT-fs (loop1): Can't find a valid FAT filesystem [ 342.962635][ T2506] blk_update_request: I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 342.976350][T15116] IPVS: ftp: loaded support on port[0] = 21 03:31:13 executing program 3: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, 0x0, &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$vivid(0x0, 0x1, 0x2) [ 342.987465][T15099] ------------[ cut here ]------------ [ 343.000332][T15099] [EXFAT] No bh, device seems wrong or to be ejected. [ 343.041927][T15099] WARNING: CPU: 0 PID: 15099 at drivers/staging/exfat/exfat_blkdev.c:62 bdev_read+0x258/0x2b0 [ 343.052240][T15099] Kernel panic - not syncing: panic_on_warn set ... [ 343.059022][T15099] CPU: 0 PID: 15099 Comm: syz-executor.2 Not tainted 5.4.0-syzkaller #0 [ 343.067361][T15099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.077609][T15099] Call Trace: [ 343.080993][T15099] dump_stack+0x197/0x210 [ 343.085350][T15099] ? bdev_read+0x1b0/0x2b0 [ 343.089785][T15099] panic+0x2e3/0x75c [ 343.093693][T15099] ? add_taint.cold+0x16/0x16 [ 343.097741][ T3907] kobject: 'loop3' (00000000e46c32dd): kobject_uevent_env [ 343.098381][T15099] ? __kasan_check_write+0x14/0x20 [ 343.110302][ T3907] kobject: 'loop3' (00000000e46c32dd): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 343.110726][T15099] ? __warn.cold+0x14/0x35 [ 343.125274][T15099] ? bdev_read+0x258/0x2b0 [ 343.129695][T15099] __warn.cold+0x2f/0x35 [ 343.133942][T15099] ? bdev_read+0x258/0x2b0 [ 343.138375][T15099] report_bug+0x289/0x300 [ 343.142715][T15099] do_error_trap+0x11b/0x200 [ 343.147314][T15099] do_invalid_op+0x37/0x50 [ 343.151734][T15099] ? bdev_read+0x258/0x2b0 [ 343.156239][T15099] invalid_op+0x23/0x30 [ 343.160407][T15099] RIP: 0010:bdev_read+0x258/0x2b0 [ 343.165434][T15099] Code: ff df 80 3c 02 00 0f 84 51 ff ff ff 4c 89 e7 e8 9e 8c 39 fc e9 44 ff ff ff e8 84 20 fe fb 48 c7 c7 20 20 3d 88 e8 30 53 cf fb <0f> 0b eb 8a e8 7f 8b 39 fc e9 17 fe ff ff e8 b5 8b 39 fc e9 99 fe [ 343.185054][T15099] RSP: 0018:ffff88805732fad0 EFLAGS: 00010282 [ 343.191136][T15099] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 343.199144][T15099] RDX: 000000000002dbcb RSI: ffffffff815cf7d6 RDI: ffffed100ae65f4c [ 343.207126][T15099] RBP: ffff88805732fb10 R08: ffff8880a94a0280 R09: ffffed1015d06159 [ 343.215111][T15099] R10: ffffed1015d06158 R11: ffff8880ae830ac7 R12: 0000000000000000 [ 343.223095][T15099] R13: ffff888038f80000 R14: 0000000000000001 R15: 0000000000000200 [ 343.231100][T15099] ? vprintk_func+0x86/0x189 [ 343.235713][T15099] sector_read+0x156/0x1e0 [ 343.240149][T15099] exfat_fill_super.cold+0x4d6/0xdba [ 343.242836][ T3907] kobject: 'loop0' (00000000d129f4f8): kobject_uevent_env [ 343.245444][T15099] ? exfat_read_root+0x8d0/0x8d0 [ 343.245499][T15099] ? vsprintf+0x40/0x40 [ 343.255034][ T3907] kobject: 'loop0' (00000000d129f4f8): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 343.257498][T15099] ? wait_for_completion+0x440/0x440 [ 343.257514][T15099] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 343.257527][T15099] ? set_blocksize+0x2bf/0x340 [ 343.257545][T15099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.292350][T15116] kobject: 'lo' (0000000018769cff): kobject_add_internal: parent: 'net', set: 'devices' [ 343.293814][T15099] mount_bdev+0x304/0x3c0 [ 343.293831][T15099] ? exfat_read_root+0x8d0/0x8d0 [ 343.293852][T15099] exfat_fs_mount+0x35/0x40 [ 343.304614][T15116] kobject: 'lo' (0000000018769cff): kobject_uevent_env [ 343.307970][T15099] ? exfat_remount+0x50/0x50 [ 343.307988][T15099] legacy_get_tree+0x108/0x220 [ 343.308009][T15099] vfs_get_tree+0x8e/0x300 [ 343.308024][T15099] do_mount+0x1369/0x1b60 [ 343.308044][T15099] ? copy_mount_string+0x40/0x40 [ 343.308058][T15099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.308078][T15099] ? _copy_from_user+0x12c/0x1a0 [ 343.313725][T15116] kobject: 'lo' (0000000018769cff): fill_kobj_path: path = '/devices/virtual/net/lo' [ 343.317543][T15099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.317561][T15099] ? copy_mount_options+0x2e8/0x3f0 [ 343.317584][T15099] ksys_mount+0xdb/0x150 [ 343.317602][T15099] __x64_sys_mount+0xbe/0x150 [ 343.317621][T15099] do_syscall_64+0xfa/0x760 [ 343.317641][T15099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.325131][T15116] kobject: 'queues' (000000009de7a3b4): kobject_add_internal: parent: 'lo', set: '' [ 343.329056][T15099] RIP: 0033:0x45a639 [ 343.329072][T15099] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.329080][T15099] RSP: 002b:00007fed0bdb3c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 343.329094][T15099] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045a639 [ 343.329102][T15099] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 0000000020000000 [ 343.329114][T15099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 343.334041][T15116] kobject: 'queues' (000000009de7a3b4): kobject_uevent_env [ 343.338253][T15099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fed0bdb46d4 [ 343.338260][T15099] R13: 00000000004c71f8 R14: 00000000004dcbc8 R15: 00000000ffffffff [ 343.344448][T15099] Kernel Offset: disabled [ 343.493570][T15099] Rebooting in 86400 seconds..