77, lost async page write 03:35:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:35:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 325.415870] attempt to access beyond end of device [ 325.421574] loop0: rw=2049, want=78, limit=64 [ 325.426262] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:35:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:35:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 326.194589] attempt to access beyond end of device [ 326.227244] loop2: rw=2049, want=78, limit=64 [ 326.271507] attempt to access beyond end of device [ 326.276749] loop3: rw=2049, want=78, limit=64 [ 326.281997] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 326.282864] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:35:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:35:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:35:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:35:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 327.109959] attempt to access beyond end of device [ 327.150608] loop4: rw=2049, want=78, limit=64 [ 327.167750] Buffer I/O error on dev loop4, logical block 77, lost async page write 03:35:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:35:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:35:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 327.545531] attempt to access beyond end of device [ 327.550589] loop2: rw=2049, want=78, limit=64 [ 327.555115] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:35:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000300)) 03:35:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 328.204194] attempt to access beyond end of device [ 328.209582] loop1: rw=2049, want=78, limit=64 [ 328.216645] Buffer I/O error on dev loop1, logical block 77, lost async page write 03:35:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:35:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 328.401265] attempt to access beyond end of device 03:35:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:35:47 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 328.448618] loop3: rw=2049, want=78, limit=64 [ 328.458028] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:35:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000300)) 03:35:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 328.959207] attempt to access beyond end of device [ 328.977710] loop0: rw=2049, want=78, limit=64 03:35:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, 0x0) [ 329.009004] Buffer I/O error on dev loop0, logical block 77, lost async page write [ 329.249763] attempt to access beyond end of device [ 329.282622] loop5: rw=2049, want=78, limit=64 03:35:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 329.313406] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:35:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:35:48 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) 03:35:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, 0x0) [ 330.221719] attempt to access beyond end of device 03:35:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 330.242608] loop0: rw=2049, want=78, limit=64 [ 330.256450] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:35:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) 03:35:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:35:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000100)) 03:35:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 331.166009] attempt to access beyond end of device [ 331.171679] loop2: rw=2049, want=78, limit=64 [ 331.176528] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:35:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000300)) 03:35:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) 03:35:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000300)) [ 332.312124] attempt to access beyond end of device [ 332.332131] loop2: rw=2049, want=78, limit=64 [ 332.348722] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:35:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 332.394145] attempt to access beyond end of device [ 332.410578] loop5: rw=2049, want=78, limit=64 [ 332.415209] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:35:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, 0x0) [ 332.971334] attempt to access beyond end of device [ 333.008266] loop4: rw=2049, want=78, limit=64 [ 333.027921] Buffer I/O error on dev loop4, logical block 77, lost async page write 03:35:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 333.263021] attempt to access beyond end of device [ 333.282531] loop4: rw=2049, want=78, limit=64 [ 333.296587] Buffer I/O error on dev loop4, logical block 77, lost async page write 03:35:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000300)) 03:35:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:53 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 333.716225] attempt to access beyond end of device [ 333.772484] loop0: rw=2049, want=78, limit=64 [ 333.818337] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:35:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:53 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:35:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:35:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:35:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 335.559198] attempt to access beyond end of device 03:35:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 335.583257] loop0: rw=2049, want=78, limit=64 [ 335.590291] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:35:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 336.015017] attempt to access beyond end of device [ 336.072244] loop5: rw=2049, want=78, limit=64 [ 336.078849] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:35:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 336.426727] attempt to access beyond end of device [ 336.433979] loop5: rw=2049, want=78, limit=64 [ 336.438868] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:35:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:55 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:35:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 336.975726] attempt to access beyond end of device [ 336.995015] loop1: rw=2049, want=78, limit=64 03:35:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 337.044476] Buffer I/O error on dev loop1, logical block 77, lost async page write 03:35:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 337.447913] attempt to access beyond end of device [ 337.453576] loop1: rw=2049, want=78, limit=64 [ 337.458507] Buffer I/O error on dev loop1, logical block 77, lost async page write 03:35:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 337.999698] attempt to access beyond end of device [ 338.023554] loop4: rw=2049, want=78, limit=64 [ 338.034938] Buffer I/O error on dev loop4, logical block 77, lost async page write 03:35:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:35:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 03:35:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) [ 338.784708] attempt to access beyond end of device [ 338.818697] attempt to access beyond end of device [ 338.843490] loop5: rw=2049, want=78, limit=64 [ 338.869450] loop4: rw=2049, want=78, limit=64 [ 338.880669] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:35:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:35:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) [ 338.936937] Buffer I/O error on dev loop4, logical block 77, lost async page write 03:35:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:35:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:35:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 339.697669] attempt to access beyond end of device [ 339.720984] loop2: rw=2049, want=78, limit=64 [ 339.741887] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 339.782812] attempt to access beyond end of device [ 339.807491] loop3: rw=2049, want=78, limit=64 03:35:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 339.830428] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:35:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 03:35:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 340.019304] attempt to access beyond end of device [ 340.033640] loop2: rw=2049, want=78, limit=64 [ 340.038766] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 340.113589] attempt to access beyond end of device 03:35:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:35:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:35:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 340.147105] loop3: rw=2049, want=78, limit=64 [ 340.161040] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:35:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000100)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 340.581931] attempt to access beyond end of device [ 340.634648] loop3: rw=2049, want=78, limit=64 [ 340.667244] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:36:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 03:36:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) 03:36:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 03:36:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 342.360337] attempt to access beyond end of device 03:36:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) 03:36:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 342.385391] loop2: rw=2049, want=78, limit=64 [ 342.396839] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 342.969119] attempt to access beyond end of device [ 342.998887] attempt to access beyond end of device [ 343.007558] loop3: rw=2049, want=78, limit=64 [ 343.025639] loop4: rw=2049, want=78, limit=64 [ 343.033735] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 343.046148] Buffer I/O error on dev loop4, logical block 77, lost async page write 03:36:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 03:36:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) 03:36:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 343.402459] attempt to access beyond end of device 03:36:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 343.430616] loop5: rw=2049, want=78, limit=64 [ 343.436016] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:02 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 343.826933] attempt to access beyond end of device [ 343.862555] loop0: rw=2049, want=78, limit=64 [ 343.895721] Buffer I/O error on dev loop0, logical block 77, lost async page write [ 343.920828] attempt to access beyond end of device [ 343.943335] loop5: rw=2049, want=78, limit=64 03:36:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 343.974862] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000300)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 344.797820] attempt to access beyond end of device [ 344.823417] loop2: rw=2049, want=78, limit=64 [ 344.829430] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000300)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 345.747483] attempt to access beyond end of device [ 345.781055] loop4: rw=2049, want=78, limit=64 [ 345.810754] Buffer I/O error on dev loop4, logical block 77, lost async page write [ 345.828516] attempt to access beyond end of device [ 345.848368] loop1: rw=2049, want=78, limit=64 03:36:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 345.888953] Buffer I/O error on dev loop1, logical block 77, lost async page write 03:36:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:05 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000300)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000006940)) 03:36:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, 0x0, &(0x7f0000000300)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000006940)) 03:36:06 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 347.362694] attempt to access beyond end of device [ 347.367782] loop2: rw=2049, want=78, limit=64 [ 347.393682] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000006940)) 03:36:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 348.076856] attempt to access beyond end of device [ 348.087206] loop0: rw=2049, want=78, limit=64 [ 348.093567] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:36:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:07 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 348.435680] attempt to access beyond end of device [ 348.455926] loop0: rw=2049, want=78, limit=64 03:36:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 348.478895] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:36:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 348.689502] attempt to access beyond end of device [ 348.696874] attempt to access beyond end of device [ 348.708255] loop1: rw=2049, want=78, limit=64 [ 348.714162] loop2: rw=2049, want=78, limit=64 [ 348.732277] Buffer I/O error on dev loop1, logical block 77, lost async page write [ 348.741997] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) 03:36:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0x0) [ 349.590964] attempt to access beyond end of device 03:36:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 349.614860] loop4: rw=2049, want=78, limit=64 [ 349.621124] Buffer I/O error on dev loop4, logical block 77, lost async page write 03:36:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) 03:36:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0x0) [ 350.137202] attempt to access beyond end of device [ 350.165230] loop5: rw=2049, want=78, limit=64 [ 350.186581] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 350.329781] attempt to access beyond end of device [ 350.343095] loop3: rw=2049, want=78, limit=64 [ 350.360831] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:36:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0x0) 03:36:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) 03:36:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) [ 350.425692] attempt to access beyond end of device [ 350.433283] loop1: rw=2049, want=78, limit=64 [ 350.439298] Buffer I/O error on dev loop1, logical block 77, lost async page write 03:36:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:10 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 351.200580] attempt to access beyond end of device [ 351.208415] loop0: rw=2049, want=78, limit=64 [ 351.216193] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:36:10 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 352.189222] attempt to access beyond end of device [ 352.197078] loop1: rw=2049, want=78, limit=64 [ 352.202990] Buffer I/O error on dev loop1, logical block 77, lost async page write 03:36:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:11 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 352.645598] attempt to access beyond end of device [ 352.658257] loop3: rw=2049, want=78, limit=64 03:36:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:12 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 354.097400] attempt to access beyond end of device [ 354.142788] loop5: rw=2049, want=78, limit=64 [ 354.153717] attempt to access beyond end of device [ 354.169035] buffer_io_error: 1 callbacks suppressed [ 354.169073] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 354.188145] loop2: rw=2049, want=78, limit=64 03:36:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 354.214012] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:13 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) [ 354.959220] attempt to access beyond end of device [ 354.994930] loop0: rw=2049, want=78, limit=64 [ 355.008080] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:36:14 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:14 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 355.267939] attempt to access beyond end of device [ 355.284256] loop3: rw=2049, want=78, limit=64 [ 355.291777] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:36:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 356.112090] attempt to access beyond end of device [ 356.159012] loop1: rw=2049, want=78, limit=64 03:36:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:15 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 356.194231] Buffer I/O error on dev loop1, logical block 77, lost async page write [ 356.230230] attempt to access beyond end of device 03:36:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 356.244256] loop5: rw=2049, want=78, limit=64 [ 356.256097] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:15 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:15 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:16 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:16 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 357.753631] attempt to access beyond end of device [ 357.792407] loop5: rw=2049, want=78, limit=64 [ 357.838676] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) [ 358.009379] attempt to access beyond end of device [ 358.019493] loop3: rw=2049, want=78, limit=64 [ 358.025135] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:36:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 358.155143] attempt to access beyond end of device [ 358.168535] loop5: rw=2049, want=78, limit=64 03:36:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 358.198286] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:17 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 358.595105] attempt to access beyond end of device [ 358.655237] loop2: rw=2049, want=78, limit=64 [ 358.699577] attempt to access beyond end of device [ 358.710716] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 358.737816] loop1: rw=2049, want=78, limit=64 03:36:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000006940)) 03:36:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 359.829438] attempt to access beyond end of device [ 359.839342] attempt to access beyond end of device [ 359.848918] loop3: rw=2049, want=78, limit=64 [ 359.859969] buffer_io_error: 1 callbacks suppressed [ 359.859996] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 359.867621] loop0: rw=2049, want=78, limit=64 [ 359.884187] Buffer I/O error on dev loop0, logical block 77, lost async page write [ 359.939810] attempt to access beyond end of device [ 359.968447] loop5: rw=2049, want=78, limit=64 [ 359.984509] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:19 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000006940)) [ 360.084790] attempt to access beyond end of device [ 360.089893] loop2: rw=2049, want=78, limit=64 [ 360.106518] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 360.476085] attempt to access beyond end of device [ 360.558654] loop2: rw=2049, want=78, limit=64 [ 360.582168] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:20 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, &(0x7f0000006940)) 03:36:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:20 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:20 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0x0) 03:36:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 361.997307] attempt to access beyond end of device [ 362.025200] loop5: rw=2049, want=78, limit=64 03:36:21 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 362.078639] attempt to access beyond end of device [ 362.080514] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 362.114783] loop3: rw=2049, want=78, limit=64 03:36:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:21 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 362.157340] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:36:21 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) [ 362.611109] attempt to access beyond end of device [ 362.618050] attempt to access beyond end of device [ 362.648418] loop5: rw=2049, want=78, limit=64 [ 362.655657] loop4: rw=2049, want=78, limit=64 [ 362.673433] Buffer I/O error on dev loop4, logical block 77, lost async page write [ 362.684162] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:22 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:22 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0x0) 03:36:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:22 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:22 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, 0x0) 03:36:23 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) [ 364.019669] attempt to access beyond end of device [ 364.029238] loop2: rw=2049, want=78, limit=64 [ 364.036385] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:23 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea9"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:23 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf138"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:23 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:24 executing program 4: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:24 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:24 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea5"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:24 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea9"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c69"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:25 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea9"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:25 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 365.836378] attempt to access beyond end of device 03:36:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 365.878931] loop2: rw=2049, want=78, limit=64 [ 365.892510] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) [ 366.198839] attempt to access beyond end of device [ 366.205371] loop0: rw=2049, want=78, limit=64 [ 366.215362] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:36:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c69"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:25 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 366.503701] attempt to access beyond end of device [ 366.513491] loop2: rw=2049, want=78, limit=64 [ 366.535770] attempt to access beyond end of device [ 366.545850] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 366.603879] loop5: rw=2049, want=78, limit=64 [ 366.643484] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:26 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea9"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:26 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea5"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) [ 366.892840] attempt to access beyond end of device [ 366.906821] loop0: rw=2049, want=78, limit=64 [ 366.913038] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:36:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:26 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 367.685928] attempt to access beyond end of device [ 367.713687] loop1: rw=2049, want=78, limit=64 [ 367.747243] Buffer I/O error on dev loop1, logical block 77, lost async page write 03:36:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:27 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:27 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea9"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c69"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:27 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea5"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:27 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 368.501181] attempt to access beyond end of device [ 368.510926] loop1: rw=2049, want=78, limit=64 [ 368.519857] Buffer I/O error on dev loop1, logical block 77, lost async page write [ 368.602641] attempt to access beyond end of device [ 368.616162] loop2: rw=2049, want=78, limit=64 [ 368.635598] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:28 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:28 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea5"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:29 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 369.725604] attempt to access beyond end of device [ 369.773021] loop3: rw=2049, want=78, limit=64 [ 369.809427] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 369.822462] attempt to access beyond end of device [ 369.832048] loop5: rw=2049, want=78, limit=64 [ 369.855332] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:29 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:29 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 370.341848] attempt to access beyond end of device [ 370.352715] loop5: rw=2049, want=78, limit=64 03:36:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea9"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea9"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:30 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:30 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 371.226055] attempt to access beyond end of device [ 371.238015] loop2: rw=2049, want=78, limit=64 [ 371.262252] buffer_io_error: 1 callbacks suppressed [ 371.262261] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 371.352473] FAT-fs (loop4): bogus number of reserved sectors [ 371.383872] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:30 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:30 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) [ 372.015392] attempt to access beyond end of device [ 372.069903] loop0: rw=2049, want=78, limit=64 [ 372.087237] attempt to access beyond end of device [ 372.098899] loop5: rw=2049, want=78, limit=64 [ 372.105855] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:31 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 372.119799] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:36:31 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 372.274136] FAT-fs (loop4): bogus number of reserved sectors [ 372.311862] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:31 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:32 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:32 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 373.156316] FAT-fs (loop4): bogus number of reserved sectors 03:36:32 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 373.216903] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:32 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:32 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:33 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:33 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 373.971120] attempt to access beyond end of device [ 373.996665] loop3: rw=2049, want=78, limit=64 [ 374.021296] Buffer I/O error on dev loop3, logical block 77, lost async page write [ 374.075542] FAT-fs (loop4): bogus number of reserved sectors [ 374.091845] attempt to access beyond end of device [ 374.105025] FAT-fs (loop4): Can't find a valid FAT filesystem [ 374.112756] loop0: rw=2049, want=78, limit=64 [ 374.119428] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:36:33 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:33 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:33 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:34 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:34 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:34 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 375.007780] FAT-fs (loop4): bogus number of reserved sectors [ 375.092293] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:34 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:34 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:34 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:35 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 375.944590] FAT-fs (loop4): bogus number of reserved sectors [ 375.953279] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:35 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) [ 376.455084] attempt to access beyond end of device [ 376.474391] loop5: rw=2049, want=78, limit=64 [ 376.489505] Buffer I/O error on dev loop5, logical block 77, lost async page write 03:36:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:36 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 376.830542] FAT-fs (loop4): bogus number of reserved sectors [ 376.886908] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:36 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:37 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 377.746384] FAT-fs (loop4): bogus number of reserved sectors [ 377.778433] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:37 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:37 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 378.204169] FAT-fs (loop1): bogus number of reserved sectors [ 378.223203] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:37 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:38 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:38 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 378.678552] FAT-fs (loop4): bogus number of reserved sectors [ 378.694206] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 379.121221] FAT-fs (loop1): bogus number of reserved sectors [ 379.169766] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:38 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 379.601890] FAT-fs (loop4): bogus number of reserved sectors [ 379.683489] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:39 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x1a) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 380.036154] FAT-fs (loop1): bogus number of reserved sectors [ 380.089515] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:39 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 380.458078] FAT-fs (loop4): bogus number of reserved sectors [ 380.466869] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 380.865531] attempt to access beyond end of device [ 380.877507] loop0: rw=2049, want=78, limit=64 [ 380.885581] Buffer I/O error on dev loop0, logical block 77, lost async page write [ 380.899558] FAT-fs (loop1): bogus number of reserved sectors [ 380.906226] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:40 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:40 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:40 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 381.472329] FAT-fs (loop4): bogus number of reserved sectors [ 381.541456] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:41 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 381.878000] FAT-fs (loop1): bogus number of reserved sectors [ 381.943591] FAT-fs (loop1): Can't find a valid FAT filesystem [ 382.036207] attempt to access beyond end of device [ 382.083369] loop0: rw=2049, want=78, limit=64 03:36:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 382.128165] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:36:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:41 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:41 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 382.357722] FAT-fs (loop3): bogus number of reserved sectors [ 382.375141] FAT-fs (loop5): bogus number of reserved sectors [ 382.392633] FAT-fs (loop4): bogus number of reserved sectors [ 382.394287] FAT-fs (loop3): Can't find a valid FAT filesystem [ 382.422609] FAT-fs (loop4): Can't find a valid FAT filesystem [ 382.437046] FAT-fs (loop5): Can't find a valid FAT filesystem 03:36:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:42 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 382.818056] FAT-fs (loop1): bogus number of reserved sectors [ 382.880465] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:42 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:42 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) [ 383.343825] FAT-fs (loop4): bogus number of reserved sectors 03:36:42 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 383.403699] FAT-fs (loop4): Can't find a valid FAT filesystem [ 383.411106] FAT-fs (loop3): bogus number of reserved sectors [ 383.451957] FAT-fs (loop3): Can't find a valid FAT filesystem 03:36:43 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 383.643161] attempt to access beyond end of device [ 383.695728] loop5: rw=2049, want=78, limit=64 [ 383.744773] Buffer I/O error on dev loop5, logical block 77, lost async page write [ 383.770647] FAT-fs (loop1): bogus number of reserved sectors [ 383.785996] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:43 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR], 0x22) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:43 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:43 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 384.247145] FAT-fs (loop4): bogus number of reserved sectors 03:36:43 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 384.321207] FAT-fs (loop4): Can't find a valid FAT filesystem [ 384.428791] attempt to access beyond end of device [ 384.488843] loop2: rw=2049, want=78, limit=64 [ 384.506560] FAT-fs (loop3): bogus number of reserved sectors [ 384.540562] FAT-fs (loop3): Can't find a valid FAT filesystem [ 384.541748] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:44 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) [ 384.775266] FAT-fs (loop1): bogus number of reserved sectors [ 384.840597] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:44 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 385.189708] FAT-fs (loop4): bogus number of reserved sectors [ 385.237338] FAT-fs (loop4): Can't find a valid FAT filesystem [ 385.337829] attempt to access beyond end of device [ 385.383675] loop2: rw=2049, want=78, limit=64 03:36:44 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 385.424455] Buffer I/O error on dev loop2, logical block 77, lost async page write 03:36:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:45 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 385.714108] FAT-fs (loop1): bogus number of reserved sectors [ 385.723007] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 386.154728] FAT-fs (loop4): bogus number of reserved sectors [ 386.167512] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:45 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:45 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 386.699723] FAT-fs (loop1): bogus number of reserved sectors [ 386.755121] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:46 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:46 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:46 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 387.069315] FAT-fs (loop4): bogus number of reserved sectors [ 387.115533] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:46 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:46 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:46 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 387.645497] FAT-fs (loop1): bogus number of reserved sectors [ 387.730905] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:47 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:47 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 388.001426] FAT-fs (loop4): invalid media value (0x00) [ 388.025190] FAT-fs (loop4): Can't find a valid FAT filesystem [ 388.087741] FAT-fs (loop0): invalid media value (0x00) [ 388.132995] FAT-fs (loop0): Can't find a valid FAT filesystem [ 388.185412] FAT-fs (loop2): bogus number of reserved sectors [ 388.258971] FAT-fs (loop2): Can't find a valid FAT filesystem 03:36:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:47 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:48 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) [ 388.587859] FAT-fs (loop1): bogus number of reserved sectors [ 388.625016] FAT-fs (loop1): Can't find a valid FAT filesystem [ 388.768179] FAT-fs (loop5): bogus number of reserved sectors 03:36:48 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 388.815259] FAT-fs (loop5): Can't find a valid FAT filesystem [ 388.877902] FAT-fs (loop3): bogus number of reserved sectors 03:36:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 388.931751] FAT-fs (loop3): Can't find a valid FAT filesystem [ 388.994006] FAT-fs (loop4): invalid media value (0x00) [ 388.999746] FAT-fs (loop4): Can't find a valid FAT filesystem [ 389.074662] FAT-fs (loop0): bogus number of reserved sectors 03:36:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 389.145223] FAT-fs (loop0): Can't find a valid FAT filesystem [ 389.285590] FAT-fs (loop2): bogus number of reserved sectors [ 389.296380] FAT-fs (loop2): Can't find a valid FAT filesystem 03:36:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 389.562742] FAT-fs (loop1): bogus number of reserved sectors [ 389.603004] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:49 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) [ 389.813923] FAT-fs (loop5): bogus number of reserved sectors [ 389.878384] FAT-fs (loop4): invalid media value (0x00) [ 389.901975] FAT-fs (loop5): Can't find a valid FAT filesystem [ 389.938451] FAT-fs (loop3): bogus number of reserved sectors [ 389.954493] FAT-fs (loop4): Can't find a valid FAT filesystem [ 390.011732] FAT-fs (loop3): Can't find a valid FAT filesystem 03:36:49 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) [ 390.208856] FAT-fs (loop0): bogus number of reserved sectors 03:36:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 390.264632] FAT-fs (loop0): Can't find a valid FAT filesystem 03:36:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:50 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 390.673467] FAT-fs (loop2): bogus number of reserved sectors [ 390.696815] FAT-fs (loop5): bogus number of reserved sectors 03:36:50 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 390.718335] FAT-fs (loop2): Can't find a valid FAT filesystem [ 390.769847] FAT-fs (loop1): bogus number of reserved sectors [ 390.777158] FAT-fs (loop5): Can't find a valid FAT filesystem [ 390.811382] FAT-fs (loop4): invalid media value (0x00) [ 390.831444] FAT-fs (loop1): Can't find a valid FAT filesystem [ 390.864664] FAT-fs (loop3): bogus number of reserved sectors [ 390.902627] FAT-fs (loop4): Can't find a valid FAT filesystem [ 390.908375] FAT-fs (loop3): Can't find a valid FAT filesystem 03:36:50 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 391.248592] FAT-fs (loop0): bogus number of reserved sectors [ 391.287377] FAT-fs (loop0): Can't find a valid FAT filesystem 03:36:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 391.665998] FAT-fs (loop1): bogus number of reserved sectors [ 391.718433] FAT-fs (loop4): invalid media value (0x00) [ 391.729135] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:51 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, &(0x7f0000000140), 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 391.772780] FAT-fs (loop5): bogus number of reserved sectors [ 391.791653] FAT-fs (loop4): Can't find a valid FAT filesystem [ 391.819944] FAT-fs (loop2): bogus number of reserved sectors [ 391.820458] FAT-fs (loop5): Can't find a valid FAT filesystem [ 391.887240] FAT-fs (loop3): bogus number of reserved sectors [ 391.927561] FAT-fs (loop2): Can't find a valid FAT filesystem [ 391.972196] FAT-fs (loop3): Can't find a valid FAT filesystem 03:36:51 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 392.313494] FAT-fs (loop0): bogus number of reserved sectors [ 392.319693] FAT-fs (loop0): Can't find a valid FAT filesystem 03:36:51 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 392.618064] FAT-fs (loop1): bogus number of reserved sectors [ 392.633357] FAT-fs (loop4): invalid media value (0x00) [ 392.648968] FAT-fs (loop1): Can't find a valid FAT filesystem [ 392.675020] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:52 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:52 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 392.907381] FAT-fs (loop5): bogus number of reserved sectors [ 392.933180] FAT-fs (loop2): bogus number of reserved sectors [ 392.963016] FAT-fs (loop5): Can't find a valid FAT filesystem [ 393.007738] FAT-fs (loop2): Can't find a valid FAT filesystem 03:36:52 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:52 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:52 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 393.554142] FAT-fs (loop1): bogus number of reserved sectors [ 393.565731] FAT-fs (loop1): Can't find a valid FAT filesystem [ 393.584087] FAT-fs (loop4): invalid media value (0x00) [ 393.646374] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:53 executing program 3: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:53 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 393.975017] FAT-fs (loop5): bogus number of reserved sectors [ 393.988076] FAT-fs (loop5): Can't find a valid FAT filesystem 03:36:53 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:53 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 394.491470] FAT-fs (loop1): bogus number of reserved sectors [ 394.529163] FAT-fs (loop4): invalid media value (0x00) [ 394.565074] FAT-fs (loop4): Can't find a valid FAT filesystem [ 394.590713] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:54 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 394.927508] FAT-fs (loop3): invalid media value (0x00) 03:36:54 executing program 2: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) [ 394.957517] FAT-fs (loop3): Can't find a valid FAT filesystem [ 395.045242] FAT-fs (loop5): bogus number of reserved sectors [ 395.093044] FAT-fs (loop5): Can't find a valid FAT filesystem 03:36:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:54 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 395.402507] FAT-fs (loop1): invalid media value (0x00) [ 395.438928] FAT-fs (loop1): Can't find a valid FAT filesystem [ 395.498695] FAT-fs (loop4): invalid media value (0x00) [ 395.574153] FAT-fs (loop4): Can't find a valid FAT filesystem 03:36:55 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:55 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:55 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:36:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 396.361979] FAT-fs (loop1): invalid media value (0x00) 03:36:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 396.393140] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:56 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:56 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 397.296091] attempt to access beyond end of device [ 397.313782] loop2: rw=2049, want=78, limit=64 [ 397.318667] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 397.394174] FAT-fs (loop1): invalid media value (0x00) 03:36:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 397.419052] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:56 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 397.656911] FAT-fs (loop2): invalid media value (0x00) [ 397.723419] FAT-fs (loop2): Can't find a valid FAT filesystem 03:36:57 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 398.245247] FAT-fs (loop1): invalid media value (0x00) 03:36:57 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 398.299817] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:58 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:36:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 399.118616] FAT-fs (loop1): invalid media value (0x00) 03:36:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 399.157113] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:36:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 399.536298] attempt to access beyond end of device [ 399.583731] loop3: rw=2049, want=78, limit=64 03:36:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 399.621424] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:36:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:59 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:36:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 399.879980] attempt to access beyond end of device [ 399.895045] loop2: rw=2049, want=78, limit=64 [ 399.964960] Buffer I/O error on dev loop2, logical block 77, lost async page write [ 399.997626] attempt to access beyond end of device [ 400.025071] loop3: rw=2049, want=78, limit=64 [ 400.055832] FAT-fs (loop1): invalid media value (0x00) [ 400.068349] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:36:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 400.108858] FAT-fs (loop1): Can't find a valid FAT filesystem 03:36:59 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:36:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 400.884817] FAT-fs (loop1): invalid media value (0x00) [ 400.893094] FAT-fs (loop1): Can't find a valid FAT filesystem 03:37:00 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:37:00 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:37:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:01 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:01 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:37:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 401.842897] FAT-fs (loop1): invalid media value (0x00) [ 401.912056] FAT-fs (loop1): Can't find a valid FAT filesystem 03:37:01 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:01 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:02 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 402.762094] FAT-fs (loop1): invalid media value (0x00) [ 402.777351] FAT-fs (loop1): Can't find a valid FAT filesystem 03:37:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:02 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:37:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 403.557879] attempt to access beyond end of device [ 403.602869] loop0: rw=2049, want=78, limit=64 03:37:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) [ 403.639110] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:37:03 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:37:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:37:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:37:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:37:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 03:37:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 405.251533] attempt to access beyond end of device [ 405.278054] loop0: rw=2049, want=78, limit=64 [ 405.321019] Buffer I/O error on dev loop0, logical block 77, lost async page write 03:37:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:04 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) 03:37:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:05 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 406.434459] attempt to access beyond end of device [ 406.455142] loop3: rw=2049, want=78, limit=64 [ 406.464209] Buffer I/O error on dev loop3, logical block 77, lost async page write 03:37:05 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:05 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:06 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x800007fd, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) 03:37:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x207, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r2 = dup2(r0, r1) clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000340)='./file1\x00', 0x0, 0x0) write$P9_RLERRORu(r1, 0x0, 0x3f88ab3d) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffd3c, &(0x7f0000000100)={0x0, 0xf7}}, 0x0) 03:37:06 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xa0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:37:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:07 executing program 5: clone(0x280, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x113d, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f0000000200)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000100)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000003c0)='./file1\x00', 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 03:37:07 executing program 2: timer_settime(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000100)=""/246) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, 0x0) ioctl$EVIOCGREP(r1, 0x40047452, &(0x7f0000d1df52)=""/174) 03:37:07 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]]], 0x1a) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 407.782420] attempt to access beyond end of device [ 407.787633] loop4: rw=2049, want=78, limit=64 [ 407.815350] Buffer I/O error on dev loop4, logical block 77, lost async page write 03:37:07 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, 0x0) 03:37:07 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x8000, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x0, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:37:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000006680)={@remote, @local}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000006840)={{{@in=@initdev, @in6=@empty}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000006940)=0xe8) 03:37:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:37:08 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r1, &(0x7f0000000600)="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", 0x200) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) sendfile(r3, r1, 0x0, 0xffffffff) 03:37:08 executing program 5: clone(0x280, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x113d, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5) nanosleep(&(0x7f0000000180)={0x77359400}, &(0x7f0000000200)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000100)='./bus\x00') sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f00000003c0)='./file1\x00', 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 03:37:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 408.895128] audit: type=1800 audit(2000000228.290:52): pid=18670 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.2" name="file0" dev="sda1" ino=16993 res=0 [ 408.927676] audit: type=1804 audit(2000000228.320:53): pid=18670 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir293223816/syzkaller.jSUxqZ/293/file0" dev="sda1" ino=16993 res=1 [ 409.246200] audit: type=1804 audit(2000000228.430:54): pid=18676 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir293223816/syzkaller.jSUxqZ/293/file0" dev="sda1" ino=16993 res=1 03:37:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}}, 0x98) 03:37:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x2, 0x0, 0x7, 0x0, 0x22}, 0x98) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) 03:37:09 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:09 executing program 3: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$UHID_INPUT(r0, &(0x7f0000000540)={0x8, "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", 0x1000}, 0x1006) [ 409.753555] audit: type=1804 audit(2000000229.150:55): pid=18704 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir293223816/syzkaller.jSUxqZ/293/file0" dev="sda1" ino=16993 res=1 03:37:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:09 executing program 3: [ 409.978038] kvm: pic: non byte write 03:37:09 executing program 3: [ 410.007072] kvm: pic: non byte write 03:37:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:09 executing program 3: [ 410.052714] kvm: pic: non byte write [ 410.095964] kvm: pic: non byte write 03:37:09 executing program 3: [ 410.128150] kvm: pic: non byte write [ 410.155054] kvm: pic: non byte write 03:37:09 executing program 3: [ 410.189795] kvm: pic: non byte write [ 410.207642] kvm: pic: non byte write [ 410.224774] kvm: pic: non byte write [ 410.251799] kvm: pic: non byte write 03:37:09 executing program 3: 03:37:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x2, 0x0, 0x7, 0x0, 0x22}, 0x98) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x40000, 0x0) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000180)) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = dup2(r0, r0) splice(r0, &(0x7f0000000040), r2, &(0x7f00000002c0), 0x1004, 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup2(r3, r2) ioctl$EVIOCSABS2F(r4, 0x401845ef, &(0x7f0000000080)={0x5, 0xffffffffffffffff, 0x1f, 0x80, 0x25b72b73, 0xffff}) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:37:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:10 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000280)=@rc, 0x80, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1fe, 0x400000000000) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, 0x0) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) stat(0x0, &(0x7f0000000300)) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_STATFS(r1, 0x0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, 0x0, 0xffd4) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:37:10 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001540)={&(0x7f0000000080)=ANY=[@ANYBLOB="0202200313000000000000ffffffff0005000600571866720a000068c3f2b5359eed8104200000005500000000000000000000000000000005000900df0000002a00002000000000fe8000000000000007000000000000ff00000000000000000200010000ffff000000050d0000000005000500eb0000000a00000000000000ff020000000000000000000008f500010000000000000000"], 0x98}}, 0x0) 03:37:10 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 03:37:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:10 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f00000084c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000008440)=[@ip_retopts={{0x1c, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x4, [@multicast2, @initdev]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x26}, @loopback}}}], 0x40}, 0x0) 03:37:10 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000000200)={0x10, 0x0, 0x0, 0xfffffffffffffffe}, 0xc) getsockname$packet(r0, 0x0, &(0x7f00000001c0)) 03:37:10 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x2, 0x0, 0x7, 0x0, 0x22}, 0x98) syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:10 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x2000000006, 0x0, 0x0, 0x50000}]}) r0 = inotify_init() ioctl$TIOCLINUX7(r0, 0x541c, 0x0) 03:37:10 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r1, &(0x7f0000000040)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000380)=[{{0x0, 0xfef3, 0x0, 0x0, 0x0, 0xfffffffffffffdcc}}], 0x400000000000490, 0x6, 0x0) socket$inet(0x2, 0x0, 0x1) 03:37:11 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000180)='\x00', 0x1, 0x8000, 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(0xffffffffffffffff, 0xc058534b, 0x0) sendmsg$nl_generic(r1, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f0000001440)={0x1c, 0x17, 0x101, 0x0, 0x0, {0x4}, [@nested={0x8, 0x11, [@generic='Q']}]}, 0x1c}}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x2064791888796fbb, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000200), 0x400000000000084, 0x0) ioctl$DRM_IOCTL_CONTROL(0xffffffffffffffff, 0x40086414, &(0x7f00000001c0)={0x3}) 03:37:11 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, 0x0) 03:37:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) sendto$inet6(r1, &(0x7f0000000040)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000380)=[{{0x0, 0xfef3, 0x0, 0x0, 0x0, 0xfffffffffffffdcc}}], 0x400000000000490, 0x6, 0x0) socket$inet(0x2, 0x0, 0x1) 03:37:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:11 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) 03:37:11 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) syz_emit_ethernet(0x4a, &(0x7f0000000240)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 03:37:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) 03:37:11 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES16=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x158) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) bind$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) [ 412.221705] ------------[ cut here ]------------ [ 412.226518] kernel BUG at fs/buffer.c:3111! [ 412.260272] loop_set_block_size: loop0 () has still dirty pages (nrpages=1) [ 412.298329] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 412.303744] Modules linked in: [ 412.306959] CPU: 0 PID: 18893 Comm: syz-executor.0 Not tainted 4.14.134 #30 [ 412.314064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.323435] task: ffff88804e3de100 task.stack: ffff888054b90000 [ 412.329608] RIP: 0010:submit_bh_wbc+0x5a0/0x720 [ 412.334290] RSP: 0018:ffff888054b97a38 EFLAGS: 00010212 [ 412.339674] RAX: 0000000000040000 RBX: ffff888095879f18 RCX: ffffc90006a3b000 [ 412.346966] RDX: 000000000000ef5c RSI: ffffffff81998780 RDI: 0000000000000001 [ 412.354249] RBP: ffff888054b97a80 R08: 0000000000000000 R09: 0000000000000001 [ 412.361534] R10: 0000000000000000 R11: ffff88804e3de100 R12: ffff888095879f18 [ 412.368817] R13: 0000000000000800 R14: 0000000000000000 R15: 0000000000000001 [ 412.376109] FS: 00007fd3cc54f700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 412.377395] attempt to access beyond end of device [ 412.384352] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 03:37:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r0, @ANYRESOCT=r0, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYRESDEC]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 412.384358] CR2: 00007f6bb5266300 CR3: 000000008826a000 CR4: 00000000001406f0 [ 412.384367] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 412.384371] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.384377] Call Trace: [ 412.384403] __sync_dirty_buffer+0xcf/0x260 [ 412.384413] sync_dirty_buffer+0x1b/0x20 [ 412.384423] fat_set_state+0x1f5/0x2e0 [ 412.384432] fat_fill_super+0x1e90/0x3560 [ 412.384447] ? fat_flush_inodes+0x170/0x170 [ 412.384547] ? pointer+0xb10/0xb10 [ 412.384560] ? snprintf+0xa5/0xd0 03:37:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x8001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYRESHEX=0x0, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRES16, @ANYPTR=&(0x7f0000000940)=ANY=[@ANYBLOB="6e643a51dddaf67aea13394992b04589b18467117773cd997848d68b39f54d7cbcc214a44057b9302af41241cb8fcac29abb7133b51ca3baea3caef74214a95edcd36a03c50a9fe9751c6d3d5f509e1528b87220f6309eb4900dec504288f7f64cc0eec42126620cfd67bea93253464050f8fdd1b9b008c94ae9bc1b77127a5a6b6468874775af26e071f96ce151644a4fba610fe0397e2a698e7b560025bca0b009217e43cb376e213e23fc5fa4b1294191539be8441ff924136c8c698978cc2fb9416625ce5926fea518369ff0dc2e18aaf1389e35ad"]], @ANYPTR=&(0x7f0000000280)=ANY=[]], 0x22) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000000700)) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000000780)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000300)=0x1e) [ 412.384568] ? vsprintf+0x40/0x40 [ 412.384578] ? set_blocksize+0x270/0x300 [ 412.384588] ? ns_test_super+0x50/0x50 [ 412.384598] vfat_fill_super+0x32/0x40 [ 412.384606] mount_bdev+0x2be/0x370 [ 412.384613] ? vfat_mount+0x40/0x40 [ 412.384624] vfat_mount+0x35/0x40 [ 412.384633] mount_fs+0x97/0x2a1 [ 412.384646] vfs_kern_mount.part.0+0x5e/0x3d0 [ 412.384658] do_mount+0x417/0x27d0 [ 412.384666] ? copy_mount_options+0x5c/0x2f0 [ 412.384680] ? rcu_read_lock_sched_held+0x110/0x130 [ 412.384691] ? copy_mount_string+0x40/0x40 [ 412.384703] ? copy_mount_options+0x1fe/0x2f0 [ 412.384714] SyS_mount+0xab/0x120 [ 412.384722] ? copy_mnt_ns+0x8c0/0x8c0 [ 412.384734] do_syscall_64+0x1e8/0x640 [ 412.384743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.384784] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 412.384794] RIP: 0033:0x45c27a [ 412.384798] RSP: 002b:00007fd3cc54ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 412.384807] RAX: ffffffffffffffda RBX: 00007fd3cc54eb40 RCX: 000000000045c27a [ 412.384813] RDX: 00007fd3cc54eae0 RSI: 00000000200002c0 RDI: 00007fd3cc54eb00 [ 412.384818] RBP: 0000000000000001 R08: 00007fd3cc54eb40 R09: 00007fd3cc54eae0 [ 412.384832] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 412.397485] loop4: rw=2049, want=78, limit=64 [ 412.402978] R13: 00000000004c8910 R14: 00000000004df598 R15: 00000000ffffffff [ 412.402991] Code: f0 80 63 01 f7 e9 3d fb ff ff 48 8d 43 20 48 89 45 d0 48 8d 43 10 48 89 45 c0 e9 34 fc ff ff e8 87 1f c3 ff 0f 0b e8 80 1f c3 ff <0f> 0b e8 79 1f c3 ff 0f 0b e8 72 1f c3 ff 0f 0b e8 6b 1f c3 ff [ 412.403166] RIP: submit_bh_wbc+0x5a0/0x720 RSP: ffff888054b97a38 [ 412.409504] ---[ end trace 7a649d22ee71504e ]--- [ 412.426240] Buffer I/O error on dev loop4, logical block 77, lost async page write [ 412.434078] Kernel panic - not syncing: Fatal exception [ 412.482985] attempt to access beyond end of device [ 412.487456] Kernel Offset: disabled [ 412.635801] Rebooting in 86400 seconds..