at$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)) r12 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x4, r12}, {0x8, 0x2}, {0x8, 0x2, r13}, {}, {0x8, 0x2, r14}], {0x10, 0x4}, {0x20, 0x3}}, 0x8c, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:44 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x45a, 0x0, 0x0, 0x0) 19:56:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4f04, 0x0, 0x0, 0x0) 19:56:44 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x0, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000040)="4904afee895e49256ffaec599a0d55b9468897e3b975354f2eb823a462229d39c0", 0x21) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="33688f300df76223d06b6e0c6a4060f07ec42ab9cac5937cdf0b93a868f5898c01c6214c0b28d69b0e1ba04e95f1787593d7a02a3493900ffecf6ca609c941fbdb624708584c3b777e5ccd467b20f8b5ea", 0x51) socket$vsock_stream(0x28, 0x1, 0x0) 19:56:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x4f040000, 0x0, 0x0, 0x0, 0x0) 19:56:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5004, 0x0, 0x0, 0x0) 19:56:44 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x45b, 0x0, 0x0, 0x0) 19:56:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x141000, 0x0) write$capi20_data(r2, &(0x7f00000000c0)={{0x10, 0x6, 0x80, 0x82, 0x4, 0x7}, 0xc4, "b2c5e7ffdaca7ce9e2d63fa93346a5023c23a196059e798e7346b54f9b83db31f4124cbf54e612be343d3739b96b71a93ddf645baec471405051644ce9bb6d8386a63068a53b5dae377c67e2733df1b0775915697d83a63f28472e02dffcc0803bffed17e00efd6fb179dae8c8fb369e1eb1a4dcec0a17c55a253097d92b9d92ca4804e010b2f201a7773ee9bc31fba754dc1c021249932c7e7f29beef3da06ecc3bc5628695b952051eb3bb12124fc509afc76eecd0fec464358e3cb8cd7ab8062a6d76"}, 0xd6) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1087.049820] FAT-fs (loop1): bogus number of reserved sectors [ 1087.087557] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:44 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5104, 0x0, 0x0, 0x0) 19:56:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x450000, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r2, 0x1}, 0x8) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f00000001c0)={0x9, 0xb3e}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000680)=0xe8) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000800)={@ll={0x11, 0x1f, r3, 0x1, 0x4, 0x6, @local}, {&(0x7f0000000740)=""/81, 0x51}, &(0x7f00000006c0), 0x20}, 0xa0) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="8721000300000000000000beb47b59f2ae1811ffac1414aa"], 0x18) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) r4 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r4, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:44 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x0, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)) r12 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x4, r12}, {0x8, 0x2}, {0x8, 0x2, r13}, {}, {0x8, 0x2, r14}], {0x10, 0x4}, {0x20, 0x3}}, 0x8c, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x50040000, 0x0, 0x0, 0x0, 0x0) 19:56:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x45c, 0x0, 0x0, 0x0) 19:56:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5204, 0x0, 0x0, 0x0) 19:56:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="6f215cabc5fe8d9047991f6b556f16e7a2fa2f1cdf113fd9ef945cd16ecd932e8902ea79fc5b14b00b57735834ecc69602c496d87f96172464db2d5dde77edd24294a79c9f48a0e86bee6e3363b60ddbc09860ec3823ac6dee41b1f583cdbf5a1a8d1137f0ada610513d4fdd2df73ecea77e8addab1e62a253f8b9f0beb75347ee1eeaad5bc2dc29110461be3ca169a1391c02f12dbb6b1a76c2db86bc98b79a96dc229d7e12d7f3c67071d5de27b2c92862cfe2b058b8668f276839e7c366ee9963c4012371c40bcebecbf9eec591b96a7eff35776333071ed79d2221377c", 0xdf, 0x40}], 0x0, &(0x7f0000000200)='aead\x00') sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) [ 1087.517504] FAT-fs (loop1): bogus number of reserved sectors [ 1087.541083] ceph: device name is missing path (no : separator in /dev/loop5) [ 1087.554962] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5304, 0x0, 0x0, 0x0) 19:56:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x45d, 0x0, 0x0, 0x0) 19:56:45 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x0, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1087.745525] ceph: device name is missing path (no : separator in /dev/loop5) 19:56:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5402, 0x0, 0x0, 0x0) 19:56:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x51040000, 0x0, 0x0, 0x0, 0x0) 19:56:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x45e, 0x0, 0x0, 0x0) [ 1088.015584] FAT-fs (loop1): bogus number of reserved sectors 19:56:45 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x2}, {0x8, 0x2, r13}, {}, {0x8, 0x2, r14}], {0x10, 0x4}, {0x20, 0x3}}, 0x8c, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:45 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5404, 0x0, 0x0, 0x0) 19:56:45 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x45f, 0x0, 0x0, 0x0) [ 1088.127980] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x10c00, 0x0) write$P9_RSTAT(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="5300000084ec6d0c503000ff7f0000000080020000000800000000003e880cc82018090004abe1e35c0000a400000007000000000000000e007b73797374656d00727573746564050061656164000500616561"], 0x53) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:46 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x0, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1088.230538] FAT-fs (loop1): bogus number of reserved sectors [ 1088.236522] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5504, 0x0, 0x0, 0x0) 19:56:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x52040000, 0x0, 0x0, 0x0, 0x0) 19:56:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x460, 0x0, 0x0, 0x0) 19:56:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600), 0x1000000000000233}}], 0x1, 0x0, 0x0) [ 1088.524843] FAT-fs (loop1): bogus number of reserved sectors 19:56:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x461, 0x0, 0x0, 0x0) [ 1088.574065] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5604, 0x0, 0x0, 0x0) 19:56:46 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x0, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:46 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}], {0x10, 0x4}, {0x20, 0x3}}, 0x8c, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000340)='/dev/mixer\x00', 0x40140, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000005c0)=0x0) getresuid(&(0x7f0000000600), &(0x7f0000000640)=0x0, &(0x7f0000000680)) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgid(0xffffffffffffffff) r6 = geteuid() getgroups(0x8, &(0x7f0000000800)=[0x0, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff, 0x0, 0xee01]) r8 = getpgrp(0xffffffffffffffff) r9 = getuid() r10 = getegid() sendmsg$netlink(r1, &(0x7f0000000900)={&(0x7f0000000540)=@proc={0x10, 0x0, 0x25dfdbfb, 0x8018001}, 0xc, &(0x7f0000000580), 0x0, &(0x7f0000000840)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}], 0xa8, 0x4000010}, 0x40001) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000300)={0x3, 0x5}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000003c0)="b7f2b02b299fd301d3e3cf0000e3ffffffffffffff000000001704b83161c23d66be704f94a29fe0b8389ccbb596e3b9cfc9e16c58634d23c6fd6712ac559d0667b9352f0bff417c3e0f3f9ebed86d21ca92e9b5569354defc0ec17ba08ab4b63857b51135f1e568f05a", 0x6a) r11 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r11, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x1, 0x40000) r12 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0x400840, 0x0) syz_open_dev$mice(&(0x7f0000000440)='/dev/input/mice\x00', 0x0, 0x200) openat$hwrng(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hwrng\x00', 0x191002, 0x0) pipe2(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r14, 0x8008ae9d, &(0x7f0000000480)=""/11) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) getsockopt$bt_BT_POWER(r12, 0x112, 0x9, &(0x7f0000000000)=0x1ff, &(0x7f0000000280)=0x1) setsockopt$packet_fanout_data(r13, 0x107, 0x16, &(0x7f0000000940)={0x5, &(0x7f0000000580)=[{0x7, 0x0, 0x3, 0xfffffffffffffff8}, {0x1f, 0xffffffff, 0xbb, 0x8}, {0x200, 0x78, 0x9}, {0x3, 0x51f, 0x4, 0x400}, {0x4, 0x9, 0x9, 0x2}]}, 0x10) getsockopt$EBT_SO_GET_ENTRIES(r15, 0x0, 0x81, &(0x7f00000001c0)={'filter\x00', 0x0, 0x3, 0x3e, [], 0x9, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/62}, &(0x7f0000000240)=0x78) 19:56:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x53040000, 0x0, 0x0, 0x0, 0x0) 19:56:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5704, 0x0, 0x0, 0x0) 19:56:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x462, 0x0, 0x0, 0x0) [ 1088.867044] FAT-fs (loop1): bogus number of reserved sectors [ 1088.923863] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5804, 0x0, 0x0, 0x0) [ 1088.991295] FAT-fs (loop1): bogus number of reserved sectors [ 1089.030558] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x500, 0x0, 0x0, 0x0) 19:56:46 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x0, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5904, 0x0, 0x0, 0x0) 19:56:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x401, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x24020010}, 0xc, &(0x7f00000000c0)={&(0x7f00000026c0)={0x11c4, 0x1f, 0x4, 0x70bd25, 0x25dfdbfb, {0x16}, [@generic="2f04dcfccf738e1e81b0e4317a77bb2e46b04b75e250a22d547c5e68b5f7068477a93caff5e9091c66e119ec03632c9be0df5600c501fa0439b155c8fdc4f89ca01a285a2b6b993c3bdbeaa583dcbd926f24c637663768b25a08f3db5f1851d1e342258a83e57b6810", @nested={0x1118, 0x11, [@generic="539b24aa9ea77c37dff5e8823f224c56657f62b5d3b6", @generic="ade9cc48747d20d6b4eaafe167e6a85993675a5275b5705fa5898cec0c1c5be889a1dedfdb2cd865b16aa9461e0a6b8ff3b022529995bbb623247dd5b62f489e4de0956366d91fba9956fc031acea5cc8baeb45ae96b22460b70282c12570564ab3e0f5714ab611f0fbf60392a3ba4adfaa1583b1992cb6ecb7263f7", @generic="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", @generic, @generic="4252c90e3705c55973c9374a462246bc9ed0a1623c8510871205a1d6487a75f53dd58f21cf7c5d54d45203ad68e6f9720735808f3eb7230b4ff04b0e71a1a4f29ddf94a072212dcef31ba87c5d8ba4ff73d724d5b5722e2270d0ed603179d5b8681a30a9647e2001c61a9258d22e831f967a4ef5c2ac7cea50c550437cd76a"]}, @typed={0x2c, 0x50, @str='rfc7539(cfb(twofish),rmd128-generic)\x00'}]}, 0x11c4}, 0x1, 0x0, 0x0, 0x4}, 0x4840) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x121001, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r0, 0x0, 0x0) fchdir(r0) sendmmsg$alg(r2, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x2400, 0x0) recvmmsg(r2, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x54040000, 0x0, 0x0, 0x0, 0x0) 19:56:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x600, 0x0, 0x0, 0x0) [ 1089.341693] FAT-fs (loop1): bogus number of reserved sectors [ 1089.390553] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x0, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5a04, 0x0, 0x0, 0x0) 19:56:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'syzkaller1\x00', 0x4b4}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f00000000c0)) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a9061bf", 0x20) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100), 0x4) 19:56:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x700, 0x0, 0x0, 0x0) 19:56:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x55040000, 0x0, 0x0, 0x0, 0x0) 19:56:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, 0x0) 19:56:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0xffffff77) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3) 19:56:47 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0x0, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x900, 0x0, 0x0, 0x0) [ 1089.722549] FAT-fs (loop1): bogus number of reserved sectors [ 1089.758583] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, 0x0) 19:56:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x56040000, 0x0, 0x0, 0x0, 0x0) 19:56:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, 0x0) 19:56:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x0, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x0, 0x10000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x3ff, 0x70}, &(0x7f00000002c0)=0xc) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000500)=0x3, 0x2) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000300)={r2, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}}, &(0x7f00000003c0)=0x84) r3 = dup3(r0, r0, 0x80000) r4 = mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x8, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000240)={0x88, 0x0, &(0x7f00000000c0)=[@dead_binder_done, @exit_looper, @reply_sg={0x40486312, {{0x400, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, &(0x7f0000000000), &(0x7f0000000040)=[0x20, 0x38, 0x18, 0x38]}}}, @release={0x40046306, 0x3}, @increfs_done={0x40106308, r4, 0x2}, @clear_death={0x400c630f, 0x4, 0x3}], 0xa5, 0x0, &(0x7f0000000180)="d56dede38100a4c4a120e12c72c25fe304fca8005e3334b431f68ea24dd7c01f387cd4ac90d566c88272c89500b29b63ae40f5fe0c16c8a21351147d49eeaabf933badd12490246cd2e21845b47d17fe55f8ccb677424899a395564db7070e715b19232a04cb8539ac764c8616f4ae24e0c4e7d7d7b2be5410e235cc0cd8d3a14af83ace422a9dcc0a951a877d02bfc408c82098d0fc266ba1b1f3e4dddf4269a0427e9f4a"}) r5 = accept$alg(r0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000400)="b5ffb9e79a5ea9c1b93fbccca318f31913d673c9b79353f40242db1b2f46cdb4bc579f518be2ee48c89de008c91b0bcef00a", &(0x7f0000000440)="c203e31d3c9020e043694f6c34a4f0594e7376c77d210782c22cc2f2af19aecaf6a0761a71bd3a54536048bed5760f9b863fb1c7e76e91f5207ed75be295aa2cfa00697c8742c2655619f7536678452da2c2341d281e391c7721738c93"}, 0x20) sendmmsg$alg(r5, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r5, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:47 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, 0x0) 19:56:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, 0x0) [ 1090.161839] FAT-fs (loop1): bogus number of reserved sectors [ 1090.233870] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000001640)=""/4096) pipe(0x0) r4 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000800)={0x0, @reserved}) r5 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) ftruncate(r5, 0x1000000) sendfile(r4, r5, &(0x7f00000000c0)=0xf10001, 0xeffffdef) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000740)=[&(0x7f0000000600)='pids.events\x00', &(0x7f0000000640)='\xac\x00', &(0x7f00000006c0)='pids.events\x00'], &(0x7f00000007c0)=[&(0x7f0000000780)='pids.events\x00']) close(0xffffffffffffffff) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r6 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="641200678564891ed42cec000000", @ANYRES16=0x0, @ANYBLOB="150027bd7000fddbdf25090000001800020004000400080002000500000008000100050000009000050008000100756470001c000200080002005d030000080004000800000008000200090000003c000200080001000b00000008000400050000000800040003000000080003000000008008000300e105000008000300050000000800040001000000080001006574680008000100696200001c000200080004000e0000000800030001040000080002000000ffff0c00060008000100039f000024000900080001000002000008000100000800000800010001010000080002009c000000"], 0xec}, 0x1, 0x0, 0x0, 0x1}, 0x4000) r7 = open(&(0x7f0000000200)='./file0\x00', 0x10000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000ac0)={{{@in6=@ipv4={[], [], @empty}}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) vmsplice(r3, &(0x7f0000000080)=[{&(0x7f0000000500)="84e2d47d2aac4418bfb5897ba3e49ceb08b42761b2eb96dc82274b8968e1c46a8eeb2d3127c9a83f80e46c7287f24819661c40845c6da8748c8ac7d88c5781e1e76a806a5810282a3f9adcf618e746e4b9b136608e1bf8698e2b213f5a6428de97db4b4ad852a9e76a33bed18a5be21d9562601e1b74fa84108a617875db90861a0f15ffa7c71a02b93bd8182c5d1d863674fcbc301df3fdd728820bf6496e3e7815f6508f826b8c58f879a1ca83a538457508f9bfae44d4baea5e97b4", 0xbd}], 0x1, 0x8) sendmmsg$alg(r6, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)}], 0x1, 0x0) recvmmsg(r6, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000900)={0x101, 0xe, 0x2e, "50794b356a4e587cf7a257bb44f1e141d564c8672326bdf8cf1c0d091bf7825817775773796142f6daea9c2259aedd353f0cad01f947d91d3303265b", 0x4, "247bb5f8ce34991e719bc9d130d712f123a400401e0928bfbc4bd74fef45817899d10b4d55810b391cd150a0ba7348e8d7701be16b4420d2aa8d966d", 0x18}) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x3d, @dev={0xac, 0x14, 0x14, 0xe}, 0x4e22, 0x0, 'nq\x00', 0x2c, 0x8, 0x72}, 0x2c) 19:56:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, 0x0) 19:56:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, 0x0) 19:56:48 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1090.393988] FAT-fs (loop1): bogus number of reserved sectors [ 1090.466730] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, 0x0) 19:56:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, 0x0) 19:56:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x57040000, 0x0, 0x0, 0x0, 0x0) 19:56:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7f00, 0x0, 0x0, 0x0) [ 1090.845599] FAT-fs (loop1): bogus number of reserved sectors [ 1090.859395] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x0, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf17, 0x0, 0x0, 0x0) 19:56:48 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xac01, 0x0, 0x0, 0x0) 19:56:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xfff, 0x200000) mq_getsetattr(r1, &(0x7f0000000100)={0x3, 0x5, 0x2, 0xb2f, 0x80000001, 0x3, 0xc260, 0x1}, &(0x7f0000000140)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0xf) recvmmsg(r2, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000000)={[{0x2, 0x100000000, 0x3f, 0xff, 0x81, 0x1ff, 0x20, 0xb5, 0x8, 0xdda2, 0x4, 0x4, 0x9}, {0x1, 0xffffffffffffffff, 0x4, 0xff, 0x6, 0x7fff, 0x5, 0x6e0, 0x100, 0x6, 0x80000001, 0x3, 0x7}, {0x2, 0xfff, 0x80f, 0x834c, 0x7, 0x4, 0x8000, 0x8, 0x0, 0x6, 0x9, 0x31, 0x4}], 0x200}) 19:56:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x58040000, 0x0, 0x0, 0x0, 0x0) 19:56:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, 0x0) 19:56:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xb103, 0x0, 0x0, 0x0) 19:56:49 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1091.412715] FAT-fs (loop1): bogus number of reserved sectors 19:56:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xdb00, 0x0, 0x0, 0x0) 19:56:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x170f, 0x0, 0x0, 0x0) [ 1091.472606] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000580)="b786bc01abc8464d4f8a106351000000", 0x10) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f00000005c0)={0x0, 0x1, 0x300f, 0x1}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f00000000c0)=@nat={'nat\x00', 0x1b, 0x5, 0x3e8, 0xd0, 0x0, 0x0, 0x0, 0x350, 0x350, 0x350, 0x350, 0x350, 0x350, 0x5, &(0x7f0000000000), {[{{@uncond, 0x0, 0x98, 0xd0}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x2, @loopback, @broadcast, @gre_key=0x3, @gre_key=0x81}}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x15}, @remote, 0xffffffff, 0xffffffff, 'caif0\x00', 'ifb0\x00', {0xff}, {0xff}, 0x2e, 0x1, 0x21}, 0x0, 0x98, 0xe0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x8, @ipv6=@mcast2, @ipv6=@mcast2, @icmp_id=0x67, @port=0x4e21}}}, {{@uncond, 0x0, 0x98, 0xd0}, @REDIRECT={0x38, 'REDIRECT\x00', 0x0, {0x1, {0x4, @multicast1, @rand_addr=0x1, @gre_key=0x8, @port=0x4e21}}}}, {{@ip={@multicast1, @local, 0x0, 0xffffff00, 'ip_vti0\x00', 'hwsim0\x00', {0xff}, {0xff}, 0x0, 0x3, 0x66}, 0x0, 0x98, 0xd0}, @MASQUERADE={0x38, 'MASQUERADE\x00', 0x0, {0x1, {0xa, @local, @loopback, @gre_key=0x4, @port=0x4e23}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x248, 0x0, 0xffffffffffffff35}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1091.614089] FAT-fs (loop1): bogus number of reserved sectors [ 1091.664877] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, 0x0) 19:56:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, 0x0) 19:56:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x59040000, 0x0, 0x0, 0x0, 0x0) 19:56:49 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video36\x00', 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) fcntl$lock(r0, 0x26, &(0x7f0000000140)={0x0, 0x1, 0x9, 0xb1f1, r1}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x2000, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000340)='tasks\x00', 0x2, 0x0) r5 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r5, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r5, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000180)) flistxattr(r2, &(0x7f0000000280)=""/71, 0x47) 19:56:49 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1091.907468] FAT-fs (loop1): bogus number of reserved sectors 19:56:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xff0f, 0x0, 0x0, 0x0) [ 1091.951596] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:49 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, 0x0) [ 1092.044460] FAT-fs (loop1): bogus number of reserved sectors [ 1092.074452] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0x0, 0x2000) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) fcntl$getflags(r0, 0x40b) 19:56:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x20000, 0x0, 0x0, 0x0) 19:56:49 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r9 = geteuid() r10 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x2, r6}, {0x2, 0x5ffa33670dff830c, r7}, {0x2, 0x4, r8}, {0x2, 0x2, r9}, {0x2, 0x4, r10}], {0x4, 0x1}, [{0x8, 0x2, r11}, {0x8, 0x4, r12}, {0x8, 0x2}, {0x8, 0x2, r13}, {}, {0x8, 0x2, r14}], {0x10, 0x4}, {0x20, 0x3}}, 0x8c, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, 0x0) 19:56:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, 0x0) 19:56:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffff9c, 0x28, &(0x7f0000000000)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r2, 0x5, 0x18}, 0xc) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:50 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1092.438620] FAT-fs (loop1): bogus number of reserved sectors 19:56:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, 0x0) [ 1092.502944] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2300, 0x0, 0x0, 0x0) [ 1092.630185] FAT-fs (loop1): bogus number of reserved sectors 19:56:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x401) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xe0000, 0x0, 0x0, 0x0) [ 1092.679075] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) 19:56:50 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r9 = geteuid() r10 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x2, r6}, {0x2, 0x5ffa33670dff830c, r7}, {0x2, 0x4, r8}, {0x2, 0x2, r9}, {0x2, 0x4, r10}], {0x4, 0x1}, [{0x8, 0x2, r11}, {0x8, 0x4, r12}, {0x8, 0x2}, {0x8, 0x2, r13}, {}, {0x8, 0x2, r14}], {0x10, 0x4}, {0x20, 0x3}}, 0x8c, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2603, 0x0, 0x0, 0x0) 19:56:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'hwsim0\x00', 0x81}) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) [ 1093.018536] FAT-fs (loop1): bogus number of reserved sectors 19:56:50 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1093.062477] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:50 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2804, 0x0, 0x0, 0x0) 19:56:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:56:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) 19:56:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) 19:56:51 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2904, 0x0, 0x0, 0x0) 19:56:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r9 = geteuid() r10 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2}, {0x2, 0x5ffa33670dff830c, r7}, {0x2, 0x4, r8}, {0x2, 0x2, r9}, {0x2, 0x4, r10}], {0x4, 0x1}, [{0x8, 0x2, r11}, {0x8, 0x4, r12}, {0x8, 0x2}, {0x8, 0x2, r13}, {}, {0x8, 0x2, r14}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) [ 1093.469655] FAT-fs (loop1): bogus number of reserved sectors [ 1093.494849] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:51 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x3b, @multicast1, 0x4e21, 0x0, 'sh\x00', 0x24eea9ed4d51a12a, 0x20, 0x43}, 0x2c) 19:56:51 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, 0x0) 19:56:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) 19:56:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3260000, 0x0, 0x0, 0x0) 19:56:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r1, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = getpgrp(0x0) rt_sigqueueinfo(r2, 0x400024, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r1, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc032100", 0x22, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0xb, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r5 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25a) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 19:56:51 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, 0x0) [ 1093.808878] FAT-fs (loop1): bogus number of reserved sectors [ 1093.867887] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, 0x0) 19:56:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) 19:56:51 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, 0x0) 19:56:51 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r9 = geteuid() r10 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2}, {0x2, 0x5ffa33670dff830c, r7}, {0x2, 0x4, r8}, {0x2, 0x2, r9}, {0x2, 0x4, r10}], {0x4, 0x1}, [{0x8, 0x2, r11}, {0x8, 0x4, r12}, {0x8, 0x2}, {0x8, 0x2, r13}, {}, {0x8, 0x2, r14}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:51 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1094.174180] FAT-fs (loop1): bogus number of reserved sectors 19:56:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) 19:56:52 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, 0x0) [ 1094.277944] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) 19:56:52 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5604, 0x0, 0x0, 0x0) 19:56:52 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) [ 1094.575093] FAT-fs (loop1): bogus number of reserved sectors [ 1094.628092] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:53 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5704, 0x0, 0x0, 0x0) 19:56:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, 0x0) 19:56:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) 19:56:53 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000600)={0xfff, 0x0, 0x10001, 0xff}) ioctl$DRM_IOCTL_AGP_BIND(0xffffffffffffffff, 0x40106436, &(0x7f0000000640)) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r1, 0x10, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000680)=ANY=[], 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) r2 = getpgrp(0x0) rt_sigqueueinfo(r2, 0x400024, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000980)=[&(0x7f0000000940)={0x0, 0x0, 0x0, 0x7, 0x802b, r1, &(0x7f00000005c0)="427c3773b915f3806bef9888fe4bef044c145776de9d7607a7808054611ffc032100", 0x22, 0x0, 0x0, 0x2}]) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r1, 0x1, 0xb, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f0000000300)=0x20200000, 0x4) r5 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x6, 0x0) ioctl$NBD_SET_BLKSIZE(r5, 0xab01, 0x1) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000340), 0x4) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {0x0, 0x0, r3, 0x0, 0x0, @ib={0x1b, 0x7, 0x3, {"68b2d26c9adcb2e904328b460bad9531"}, 0x9, 0x4, 0x9}}}, 0xfffffffffffffe66) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf32(r1, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x25a) ioctl$KVM_GET_VCPU_MMAP_SIZE(r5, 0xae04) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000440)=0x10001, 0x8) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 19:56:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r9 = geteuid() r10 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2}, {0x2, 0x5ffa33670dff830c, r7}, {0x2, 0x4, r8}, {0x2, 0x2, r9}, {0x2, 0x4, r10}], {0x4, 0x1}, [{0x8, 0x2, r11}, {0x8, 0x4, r12}, {0x8, 0x2}, {0x8, 0x2, r13}, {}, {0x8, 0x2, r14}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, 0x0) [ 1095.447715] FAT-fs (loop1): bogus number of reserved sectors [ 1095.460457] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:53 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5804, 0x0, 0x0, 0x0) 19:56:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x8260000, 0x0, 0x0, 0x0) 19:56:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, 0x0) 19:56:53 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5904, 0x0, 0x0, 0x0) 19:56:53 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, 0x0) 19:56:53 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r9 = geteuid() r10 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2}, {0x2, 0x5ffa33670dff830c, r7}, {0x2, 0x4, r8}, {0x2, 0x2, r9}, {0x2, 0x4, r10}], {0x4, 0x1}, [{0x8, 0x2, r11}, {0x8, 0x4, r12}, {0x8, 0x2}, {0x8, 0x2, r13}, {}, {0x8, 0x2, r14}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:53 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5a04, 0x0, 0x0, 0x0) [ 1096.031064] FAT-fs (loop1): bogus number of reserved sectors [ 1096.086463] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:53 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, 0x0) 19:56:54 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x0, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x0, 0x0) 19:56:54 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5b04, 0x0, 0x0, 0x0) 19:56:54 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0x0, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, 0x0) 19:56:54 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5c04, 0x0, 0x0, 0x0) [ 1096.440053] FAT-fs (loop1): bogus number of reserved sectors [ 1096.457732] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xf4ffffff, 0x0, 0x0, 0x0, 0x0) 19:56:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, 0x0) 19:56:54 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5d04, 0x0, 0x0, 0x0) 19:56:54 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r15}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1096.725925] FAT-fs (loop1): bogus number of reserved sectors [ 1096.797978] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:54 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5e04, 0x0, 0x0, 0x0) 19:56:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, 0x0) [ 1096.923289] FAT-fs (loop1): bogus number of reserved sectors [ 1096.967958] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:54 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:54 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, 0x0) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xf5ffffff, 0x0, 0x0, 0x0, 0x0) 19:56:54 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5f04, 0x0, 0x0, 0x0) 19:56:54 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) 19:56:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, 0x0) [ 1097.352017] FAT-fs (loop1): bogus number of reserved sectors 19:56:55 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x170f0000, 0x0, 0x0, 0x0) [ 1097.448273] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:55 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, 0x0) 19:56:55 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6004, 0x0, 0x0, 0x0) 19:56:55 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0) 19:56:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6104, 0x0, 0x0, 0x0) [ 1097.761405] FAT-fs (loop1): bogus number of reserved sectors [ 1097.847910] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:55 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, 0x0) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfbffffff, 0x0, 0x0, 0x0, 0x0) 19:56:55 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) 19:56:55 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6204, 0x0, 0x0, 0x0) 19:56:55 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @remote, 'team_slave_1\x00'}}, 0x22) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x10f7687, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000200)="c87e52f38aa902bdc6ec7f8989ae92595d594898a552b7910d20d71b45ccc456fd306666ab1e3382c704c97db8fd69eb4c04bd5eab25ebf4d0bcfc6d97cb8338f2392a9665faf5", 0x47, 0x8}, {&(0x7f0000000080)="30ea09e47d0da80979b89944d4d70cb6bfb1048d91be1167d0f7d9cae4802a1b6dd7b110a5a951", 0x27, 0x5}, {&(0x7f0000000280)="742dc1207eda13c05ab0edeb8b52bc343954e228e22b118a4d994fd6052027ad1cf6bfcf8f0924473f03d915e2d7eadabed8cf52decb2692c793e1d38316103105fd8d9a1b93", 0x46, 0xee1}, {&(0x7f0000000300)="ebdf0e305a0b5a5c5cac916673ce36048bc651d5818c1b69de4009e118cc87d19f7986e65f404cc05454630900932e6dbe71de40cd768c55b1b8cb906a3682e2f069bcb2925b3ec8d50234639eecdbd3cd8bb0514703a7953e104a1e92a22a2c7d6f5df52327a45df9eea05ccd7e898580a1bcf74a2feb8da2c447bd313cdb2c41f00ad50a823a10c7d8a5", 0x8b, 0xffffffffffffffe0}], 0x200000, &(0x7f0000000700)={[{@shortname_lower='shortname=lower'}, {@shortname_win95='shortname=win95'}, {@rodir='rodir'}, {@numtail='nonumtail=0'}, {@fat=@debug='debug'}, {@utf8='utf8=1'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@appraise='appraise'}, {@fowner_lt={'fowner<', r2}}, {@smackfsroot={'smackfsroot', 0x3d, 'proc,eth0lo^em1userposix_acl_access}#'}}, {@euid_gt={'euid>', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vcan0\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'vcan0\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'vboxnet0\x87'}}, {@appraise_type='appraise_type=imasig'}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) r6 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r6, &(0x7f0000010ff0), 0x10) recvmmsg(r6, &(0x7f0000000080), 0x400000000000274, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000007ff0)={0x1d, r5}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x3, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0xfcd8}}, 0x0) [ 1098.176664] FAT-fs (loop1): bogus number of reserved sectors 19:56:56 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, 0x0) [ 1098.217674] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, 0x0) [ 1098.360157] FAT-fs (loop3): Unrecognized mount option "mask=^MAY_EXEC" or missing value [ 1098.368992] FAT-fs (loop1): bogus number of reserved sectors [ 1098.391075] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x23000000, 0x0, 0x0, 0x0) 19:56:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, 0x0) 19:56:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, 0x0) 19:56:56 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000180)=@pppoe={0x18, 0x0, {0x0, @remote, 'team_slave_1\x00'}}, 0x22) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@loopback}}, &(0x7f00000006c0)=0xe8) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x10f7687, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000200)="c87e52f38aa902bdc6ec7f8989ae92595d594898a552b7910d20d71b45ccc456fd306666ab1e3382c704c97db8fd69eb4c04bd5eab25ebf4d0bcfc6d97cb8338f2392a9665faf5", 0x47, 0x8}, {&(0x7f0000000080)="30ea09e47d0da80979b89944d4d70cb6bfb1048d91be1167d0f7d9cae4802a1b6dd7b110a5a951", 0x27, 0x5}, {&(0x7f0000000280)="742dc1207eda13c05ab0edeb8b52bc343954e228e22b118a4d994fd6052027ad1cf6bfcf8f0924473f03d915e2d7eadabed8cf52decb2692c793e1d38316103105fd8d9a1b93", 0x46, 0xee1}, {&(0x7f0000000300)="ebdf0e305a0b5a5c5cac916673ce36048bc651d5818c1b69de4009e118cc87d19f7986e65f404cc05454630900932e6dbe71de40cd768c55b1b8cb906a3682e2f069bcb2925b3ec8d50234639eecdbd3cd8bb0514703a7953e104a1e92a22a2c7d6f5df52327a45df9eea05ccd7e898580a1bcf74a2feb8da2c447bd313cdb2c41f00ad50a823a10c7d8a5", 0x8b, 0xffffffffffffffe0}], 0x200000, &(0x7f0000000700)={[{@shortname_lower='shortname=lower'}, {@shortname_win95='shortname=win95'}, {@rodir='rodir'}, {@numtail='nonumtail=0'}, {@fat=@debug='debug'}, {@utf8='utf8=1'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@appraise='appraise'}, {@fowner_lt={'fowner<', r2}}, {@smackfsroot={'smackfsroot', 0x3d, 'proc,eth0lo^em1userposix_acl_access}#'}}, {@euid_gt={'euid>', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vcan0\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'vcan0\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'vboxnet0\x87'}}, {@appraise_type='appraise_type=imasig'}]}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000000ffd8)={'vcan0\x00', 0x0}) r6 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r6, &(0x7f0000010ff0), 0x10) recvmmsg(r6, &(0x7f0000000080), 0x400000000000274, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000007ff0)={0x1d, r5}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x3, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0xfcd8}}, 0x0) 19:56:56 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1, 0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 1098.724360] FAT-fs (loop1): bogus number of reserved sectors 19:56:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, 0x0) [ 1098.765065] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2a040000, 0x0, 0x0, 0x0) 19:56:56 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1098.831616] FAT-fs (loop3): Unrecognized mount option "mask=^MAY_EXEC" or missing value 19:56:56 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1098.939068] FAT-fs (loop1): bogus number of reserved sectors [ 1098.963682] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:56 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x32030000, 0x0, 0x0, 0x0) 19:56:56 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, 0x0) 19:56:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, 0x0) 19:56:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1, 0x0, 0x0, 0x3700}}], 0x1, 0x0, 0x0) 19:56:57 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x8402, 0x0, 0x0, 0x0) 19:56:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) [ 1099.314527] FAT-fs (loop1): bogus number of reserved sectors 19:56:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1099.375396] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:57 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:57 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, 0x0) 19:56:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, 0x0) 19:56:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) [ 1099.672832] FAT-fs (loop1): bogus number of reserved sectors [ 1099.696580] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:57 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:57 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xff0f, 0x0, 0x0, 0x0) 19:56:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xff0f0000, 0x0, 0x0, 0x0, 0x0) 19:56:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, 0x0) 19:56:57 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:57 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x20000, 0x0, 0x0, 0x0) 19:56:57 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:57 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, 0x0) [ 1100.208456] FAT-fs (loop1): bogus number of reserved sectors [ 1100.214561] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:58 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4f040000, 0x0, 0x0, 0x0) [ 1100.339807] FAT-fs (loop1): bogus number of reserved sectors [ 1100.365623] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x40000, 0x0, 0x0, 0x0) 19:56:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, 0x0) 19:56:58 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, 0x0, 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1100.612610] FAT-fs (loop1): bogus number of reserved sectors [ 1100.628629] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:58 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x50040000, 0x0, 0x0, 0x0) 19:56:58 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xe0000, 0x0, 0x0, 0x0) 19:56:58 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(0x0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) 19:56:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) 19:56:58 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x51040000, 0x0, 0x0, 0x0) [ 1100.943767] FAT-fs (loop1): bogus number of reserved sectors [ 1101.018000] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:58 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x52040000, 0x0, 0x0, 0x0) 19:56:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) 19:56:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, 0x0) 19:56:59 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1101.383853] FAT-fs (loop1): bogus number of reserved sectors [ 1101.404180] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:59 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x53040000, 0x0, 0x0, 0x0) 19:56:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) 19:56:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, 0x0) 19:56:59 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x54020000, 0x0, 0x0, 0x0) [ 1101.687313] FAT-fs (loop1): bogus number of reserved sectors 19:56:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3260000, 0x0, 0x0, 0x0) [ 1101.728352] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x54040000, 0x0, 0x0, 0x0) [ 1101.847299] FAT-fs (loop1): bogus number of reserved sectors [ 1101.898292] FAT-fs (loop1): Can't find a valid FAT filesystem 19:56:59 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:56:59 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x55040000, 0x0, 0x0, 0x0) 19:56:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, 0x0) 19:56:59 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) 19:57:00 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x56040000, 0x0, 0x0, 0x0) 19:57:00 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1102.340576] FAT-fs (loop1): bogus number of reserved sectors 19:57:00 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) [ 1102.383584] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:00 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x57040000, 0x0, 0x0, 0x0) [ 1102.482454] FAT-fs (loop1): bogus number of reserved sectors [ 1102.571683] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x0, 0x0) 19:57:00 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) 19:57:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x58040000, 0x0, 0x0, 0x0) 19:57:00 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:00 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x59040000, 0x0, 0x0, 0x0) [ 1102.954764] FAT-fs (loop1): bogus number of reserved sectors 19:57:00 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) [ 1102.999086] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:00 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x0, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:00 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfffffff4, 0x0, 0x0, 0x0, 0x0) 19:57:01 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:01 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, 0x0) 19:57:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5a040000, 0x0, 0x0, 0x0) [ 1103.283746] FAT-fs (loop1): bogus number of reserved sectors [ 1103.301030] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfffffff5, 0x0, 0x0, 0x0, 0x0) 19:57:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, 0x0) 19:57:01 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, 0x0) 19:57:01 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, 0x0) [ 1103.684160] FAT-fs (loop1): bogus number of reserved sectors [ 1103.714634] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:01 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0x0, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:01 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, 0x0) [ 1103.804559] FAT-fs (loop1): bogus number of reserved sectors [ 1103.859353] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:01 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:01 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) 19:57:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, 0x0) 19:57:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, 0x0) [ 1104.214924] FAT-fs (loop1): bogus number of reserved sectors 19:57:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) 19:57:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x11}}], 0x1, 0x0, 0x0) [ 1104.271050] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1104.421717] FAT-fs (loop1): bogus number of reserved sectors [ 1104.427583] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000007c0)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)="585054efe3f09c1c5454d594337463d318", 0x11}], 0x1}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0xa5}], 0x1}}], 0x1, 0x0, 0x0) 19:57:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, 0x0) 19:57:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) 19:57:02 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x0) 19:57:02 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:02 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7f000000, 0x0, 0x0, 0x0) 19:57:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, 0x0) [ 1104.885037] FAT-fs (loop1): bogus number of reserved sectors 19:57:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) [ 1104.940345] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:02 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 19:57:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0) 19:57:02 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x170f0000, 0x0, 0x0, 0x0) 19:57:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, 0x0) [ 1105.269254] FAT-fs (loop1): bogus number of reserved sectors [ 1105.302346] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:03 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0) 19:57:03 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:03 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, 0x0) 19:57:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xac010000, 0x0, 0x0, 0x0) 19:57:03 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) [ 1105.589036] FAT-fs (loop1): bogus number of reserved sectors [ 1105.627973] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xb1030000, 0x0, 0x0, 0x0) 19:57:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, 0x0) 19:57:03 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x0, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) 19:57:03 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, 0x0) [ 1105.885780] FAT-fs (loop1): bogus number of reserved sectors [ 1105.911399] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xdb000000, 0x0, 0x0, 0x0) 19:57:03 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:03 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:03 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:03 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x23000000, 0x0, 0x0, 0x0) 19:57:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, 0x0) [ 1106.250998] FAT-fs (loop1): bogus number of reserved sectors [ 1106.284888] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1106.455619] FAT-fs (loop1): bogus number of reserved sectors 19:57:04 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x28040000, 0x0, 0x0, 0x0) 19:57:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf4ffffff, 0x0, 0x0, 0x0) [ 1106.515936] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:04 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x2000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:04 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x29040000, 0x0, 0x0, 0x0) 19:57:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 19:57:04 executing program 5 (fault-call:3 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:04 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:04 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:04 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) 19:57:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) [ 1106.990948] FAT-fs (loop1): bogus number of reserved sectors [ 1107.018640] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:04 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) 19:57:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 19:57:05 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, 0x0) 19:57:05 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:05 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) [ 1107.550493] FAT-fs (loop1): bogus number of reserved sectors [ 1107.572526] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:05 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {0x8, 0x0, r15}, {0x8, 0x2, r16}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, r1, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r17}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, 0x0) 19:57:05 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x7ffffffffffff, 0x0, 0x0, 0x0, 0x0) 19:57:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5421, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:05 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 19:57:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x56040000, 0x0, 0x0, 0x0) [ 1107.935999] FAT-fs (loop1): bogus number of reserved sectors [ 1107.997009] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:05 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:05 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x57040000, 0x0, 0x0, 0x0) 19:57:05 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, 0x0) 19:57:05 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xe000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5450, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:06 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x58040000, 0x0, 0x0, 0x0) 19:57:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xff0f0000, 0x0, 0x0, 0x0) [ 1108.427887] FAT-fs (loop1): bogus number of reserved sectors [ 1108.484326] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:06 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5451, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:06 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x59040000, 0x0, 0x0, 0x0) 19:57:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) [ 1108.839104] FAT-fs (loop1): bogus number of reserved sectors [ 1108.859970] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:06 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) 19:57:06 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5a040000, 0x0, 0x0, 0x0) 19:57:06 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5452, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) 19:57:07 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1109.254542] FAT-fs (loop1): bogus number of reserved sectors 19:57:07 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5b040000, 0x0, 0x0, 0x0) [ 1109.315257] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) 19:57:07 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1109.606668] FAT-fs (loop1): bogus number of reserved sectors [ 1109.636373] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5460, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:07 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5c040000, 0x0, 0x0, 0x0) [ 1109.750119] FAT-fs (loop1): bogus number of reserved sectors [ 1109.755975] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, 0x0) 19:57:07 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, 0x0) 19:57:07 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5d040000, 0x0, 0x0, 0x0) 19:57:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae03, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1110.192256] FAT-fs (loop1): bogus number of reserved sectors [ 1110.214751] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffff4, 0x0, 0x0, 0x0) 19:57:08 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:08 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:08 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5e040000, 0x0, 0x0, 0x0) 19:57:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae41, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1110.545853] FAT-fs (loop1): bogus number of reserved sectors [ 1110.567913] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 19:57:08 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1110.653855] FAT-fs (loop1): bogus number of reserved sectors 19:57:08 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5f040000, 0x0, 0x0, 0x0) [ 1110.720673] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:08 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 19:57:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x40049409, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:08 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:08 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, 0x0) 19:57:08 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffffb, 0x0, 0x0, 0x0) [ 1111.208213] FAT-fs (loop1): bogus number of reserved sectors 19:57:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4008ae61, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1111.266387] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1111.390854] FAT-fs (loop1): bogus number of reserved sectors 19:57:09 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:09 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, 0x0) [ 1111.440408] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:09 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x60040000, 0x0, 0x0, 0x0) 19:57:09 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:09 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) 19:57:09 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x61040000, 0x0, 0x0, 0x0) [ 1111.731797] FAT-fs (loop1): bogus number of reserved sectors [ 1111.784689] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4008ae6a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:09 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:09 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) 19:57:09 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:09 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x62040000, 0x0, 0x0, 0x0) 19:57:09 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:09 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) [ 1112.151383] FAT-fs (loop1): bogus number of reserved sectors 19:57:09 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, 0x0) [ 1112.202382] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) 19:57:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2000000000000, 0x0, 0x0, 0x0) 19:57:10 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1112.610286] FAT-fs (loop1): bogus number of reserved sectors [ 1112.616308] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:10 executing program 3 (fault-call:3 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, 0x0) 19:57:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) 19:57:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7ffffffffffff, 0x0, 0x0, 0x0) [ 1112.947315] FAT-fs (loop1): bogus number of reserved sectors [ 1112.974949] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae68, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:10 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) 19:57:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:10 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xe000000000000, 0x0, 0x0, 0x0) 19:57:11 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x84020000, 0x0, 0x0, 0x0) [ 1113.340923] FAT-fs (loop1): bogus number of reserved sectors [ 1113.418116] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020940d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 19:57:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:11 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 19:57:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 19:57:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, 0x0) 19:57:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1113.806120] FAT-fs (loop1): bogus number of reserved sectors [ 1113.843109] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:11 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bb"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:11 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5421, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:11 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) 19:57:11 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 19:57:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae76, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1114.204808] FAT-fs (loop1): bogus number of reserved sectors [ 1114.244334] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, 0x0) 19:57:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5450, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x326000000000000, 0x0, 0x0, 0x0) 19:57:12 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf4ffffff, 0x0, 0x0, 0x0) 19:57:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:12 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 19:57:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5451, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1114.757296] FAT-fs (loop1): bogus number of reserved sectors [ 1114.780171] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 19:57:12 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x1126000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:12 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 19:57:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5452, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:12 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) [ 1115.219661] FAT-fs (loop1): bogus number of reserved sectors 19:57:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) [ 1115.271354] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:13 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x170f000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 19:57:13 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4068aea3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x5460, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 19:57:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) [ 1115.595164] FAT-fs (loop1): bogus number of reserved sectors [ 1115.629522] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:13 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x1826000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 19:57:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 19:57:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1115.935860] FAT-fs (loop1): bogus number of reserved sectors [ 1115.958098] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae03, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:13 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x826000000000000, 0x0, 0x0, 0x0) 19:57:13 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:13 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b7"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:13 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, 0x0) 19:57:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xae41, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1116.250468] FAT-fs (loop1): bogus number of reserved sectors [ 1116.259807] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) [ 1116.317607] FAT-fs (loop1): bogus number of reserved sectors [ 1116.356400] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:14 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:14 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xff0f0000, 0x0, 0x0, 0x0) 19:57:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 19:57:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x40049409, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:14 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1116.783060] FAT-fs (loop1): bogus number of reserved sectors 19:57:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, 0x0) 19:57:14 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) 19:57:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc008ae67, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1116.856775] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) 19:57:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4008ae61, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:14 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) [ 1117.061866] FAT-fs (loop1): bogus number of reserved sectors [ 1117.099220] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:14 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) 19:57:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x0, 0x0) 19:57:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(0x0, &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc00caee0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1117.338172] FAT-fs (loop1): bogus number of reserved sectors 19:57:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4008ae6a, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1117.411063] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 19:57:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) 19:57:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc0189436, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1117.597672] FAT-fs (loop1): bogus number of reserved sectors [ 1117.625848] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x170f000000000000, 0x0, 0x0, 0x0) 19:57:15 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(0x0, &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, 0x0) 19:57:15 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x2300000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae42, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 19:57:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, 0x0) 19:57:15 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x2a04000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc020660b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:15 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffff4, 0x0, 0x0, 0x0) 19:57:15 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 19:57:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1118.185615] FAT-fs (loop1): bogus number of reserved sectors [ 1118.218607] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:16 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:16 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) 19:57:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x0, 0x0) [ 1118.448391] FAT-fs (loop1): bogus number of reserved sectors [ 1118.454262] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4010ae68, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:16 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2300000000000000, 0x0, 0x0, 0x0) 19:57:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 19:57:16 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:16 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2a04000000000000, 0x0, 0x0, 0x0) 19:57:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x1fc, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 19:57:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020940d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1118.999010] FAT-fs (loop1): bogus number of reserved sectors [ 1119.004874] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:16 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:16 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3203000000000000, 0x0, 0x0, 0x0) 19:57:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xfc01, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:16 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, 0x0) 19:57:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 19:57:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x800000000, 0x0, 0x0, 0x0) 19:57:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x80ffff, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1119.434040] FAT-fs (loop1): bogus number of reserved sectors [ 1119.484284] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) 19:57:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 19:57:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) 19:57:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) [ 1119.836641] FAT-fs (loop1): bogus number of reserved sectors [ 1119.868075] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x1000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae76, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) 19:57:17 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x4e04000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:17 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 19:57:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x2000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2000000000000, 0x0, 0x0, 0x0) 19:57:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4f04000000000000, 0x0, 0x0, 0x0) [ 1120.248534] FAT-fs (loop1): bogus number of reserved sectors 19:57:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020aea5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1120.293891] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:18 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x4f04000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5004000000000000, 0x0, 0x0, 0x0) 19:57:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4000000000000, 0x0, 0x0, 0x0) 19:57:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1120.552772] FAT-fs (loop1): bogus number of reserved sectors [ 1120.578585] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xfc010000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5104000000000000, 0x0, 0x0, 0x0) 19:57:18 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5004000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7ffffffffffff, 0x0, 0x0, 0x0) 19:57:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5204000000000000, 0x0, 0x0, 0x0) 19:57:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4068aea3, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:18 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xe000000000000, 0x0, 0x0, 0x0) [ 1120.945039] FAT-fs (loop1): bogus number of reserved sectors 19:57:18 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1120.986395] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xfdfdffff, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:18 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5304000000000000, 0x0, 0x0, 0x0) [ 1121.179868] FAT-fs (loop1): bogus number of reserved sectors [ 1121.185731] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 19:57:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:19 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5104000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5402000000000000, 0x0, 0x0, 0x0) 19:57:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xffff8000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 19:57:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1121.508393] FAT-fs (loop1): bogus number of reserved sectors 19:57:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5404000000000000, 0x0, 0x0, 0x0) [ 1121.603063] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc0045878, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5504000000000000, 0x0, 0x0, 0x0) 19:57:19 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5204000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 19:57:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xfffffdfd, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x326000000000000, 0x0, 0x0, 0x0) 19:57:19 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5604000000000000, 0x0, 0x0, 0x0) 19:57:19 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1122.007880] FAT-fs (loop1): bogus number of reserved sectors [ 1122.046810] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:19 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 19:57:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x80ffff00000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1122.127048] FAT-fs (loop1): bogus number of reserved sectors 19:57:20 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5704000000000000, 0x0, 0x0, 0x0) [ 1122.211450] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc008ae67, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 19:57:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5304000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:20 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5804000000000000, 0x0, 0x0, 0x0) 19:57:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 19:57:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1122.510812] FAT-fs (loop1): bogus number of reserved sectors [ 1122.533364] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc00caee0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x100000000000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1122.622318] FAT-fs (loop1): bogus number of reserved sectors 19:57:20 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5904000000000000, 0x0, 0x0, 0x0) 19:57:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) [ 1122.676157] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:20 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5404000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:20 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x5a04000000000000, 0x0, 0x0, 0x0) 19:57:20 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 19:57:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc0189436, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1122.954560] FAT-fs (loop1): bogus number of reserved sectors [ 1122.977855] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:20 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, 0x0) 19:57:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x200000000000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:20 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000400)) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) [ 1123.077998] FAT-fs (loop1): bogus number of reserved sectors [ 1123.135729] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 19:57:21 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) 19:57:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5504000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc020660b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x8000000000000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, 0x0) [ 1123.488191] FAT-fs (loop1): bogus number of reserved sectors 19:57:21 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) [ 1123.549743] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:21 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, 0x0) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) 19:57:21 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) [ 1123.736093] FAT-fs (loop1): bogus number of reserved sectors 19:57:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1123.788954] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xfc01000000000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:21 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) 19:57:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x0, 0x0) 19:57:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5604000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:21 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) 19:57:21 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7f00000000000000, 0x0, 0x0, 0x0) 19:57:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x1fc, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1124.146953] FAT-fs (loop1): bogus number of reserved sectors [ 1124.166480] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:22 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xfdfdffff00000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x170f000000000000, 0x0, 0x0, 0x0) [ 1124.308066] FAT-fs (loop1): bogus number of reserved sectors 19:57:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0) [ 1124.367886] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5704000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 19:57:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x8000000000000000, 0x0, 0x0, 0x0) 19:57:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xfc01, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 19:57:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) [ 1124.757335] FAT-fs (loop1): bogus number of reserved sectors 19:57:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1124.835151] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:22 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b0000000000000000000000000000000000000000000109000000030000000000008003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', 0x0, &(0x7f00000002c0)='fuseblk\x00', 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) 19:57:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x0, 0x0) 19:57:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5804000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x80ffff, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:22 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2300000000000000, 0x0, 0x0, 0x0) 19:57:22 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xac01000000000000, 0x0, 0x0, 0x0) [ 1125.170377] FAT-fs (loop1): bogus number of reserved sectors 19:57:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0x1fc, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) [ 1125.231890] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x5904000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2804000000000000, 0x0, 0x0, 0x0) 19:57:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x1000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:23 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x100040, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xb103000000000000, 0x0, 0x0, 0x0) [ 1125.505689] FAT-fs (loop1): bogus number of reserved sectors [ 1125.519226] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x2904000000000000, 0x0, 0x0, 0x0) 19:57:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0xfc01, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xdb00000000000000, 0x0, 0x0, 0x0) 19:57:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x2000000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) [ 1125.853440] FAT-fs (loop1): bogus number of reserved sectors [ 1125.884433] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:23 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, &(0x7f0000000a40)={{'fd', 0x3d, r2}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r16}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x10000}}, {@default_permissions='default_permissions'}], [{@permit_directio='permit_directio'}]}}) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:23 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x0, 0x0) 19:57:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0x80ffff, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xfc010000, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) 19:57:23 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 19:57:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf4ffffff00000000, 0x0, 0x0, 0x0) [ 1126.191026] FAT-fs (loop1): bogus number of reserved sectors [ 1126.198404] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1126.312008] FAT-fs (loop1): bogus number of reserved sectors [ 1126.344573] FAT-fs (loop1): Can't find a valid FAT filesystem 19:57:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 19:57:24 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) 19:57:24 executing program 1: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0) 19:57:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0x1000000, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500), 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuseblk(0x0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x0, 0x0) 19:57:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000001880)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001740)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000002000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0xfdfdffff, 0x0, 0x0, 0x712000, &(0x7f0000001000/0x2000)=nil}) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) [ 1126.639494] FAT-fs (loop1): bogus number of reserved sectors 19:57:24 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0xffffffffffffffc7) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000580)='/dev/nullb0\x00', 0x121041, 0x0) clock_settime(0x0, 0x0) fstat(r2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000600)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000bc0)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000d40)={0x0, 0x0}, &(0x7f0000000d80)=0xc) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000dc0)={0x0, 0x0}, &(0x7f0000000e00)=0xc) r10 = geteuid() r11 = getuid() stat(&(0x7f0000000e40)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() stat(&(0x7f00000024c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000002540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, 0x0) lstat(&(0x7f0000002640)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000026c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000005c0)='system.posix_acl_access\x00', &(0x7f0000002740)={{}, {}, [{0x2, 0x1, r4}, {0x2, 0x3, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x5ffa33670dff830c, r8}, {0x2, 0x4, r9}, {0x2, 0x2, r10}, {0x2, 0x4, r11}], {0x4, 0x1}, [{0x8, 0x2, r12}, {0x8, 0x4, r13}, {0x8, 0x2}, {0x8, 0x2, r14}, {}, {0x8, 0x2, r15}], {0x10, 0x4}, {0x20, 0x3}}, 0x94, 0x3) getxattr(0x0, 0x0, &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x4, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x7}, 0x1, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x0, 0x7f}, 0x0, 0x7, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x14) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="7101dfd81a19859558b811759e2937d1d500599979b33ac933f08b54528f40bbbb1abf376e870a29b78c"], 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000400)=0xc) mount$fuseblk(&(0x7f0000000100)='/dev/loop0\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000002c0)='fuseblk\x00', 0x100040, 0x0) lstat(0x0, &(0x7f0000000800)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000880)=0xc) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) 19:57:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) [ 1126.712291] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1126.760945] ================================================================== [ 1126.768836] BUG: KASAN: slab-out-of-bounds in kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1126.776812] Read of size 8 at addr ffff8880903d4e10 by task syz-executor5/26439 [ 1126.784253] [ 1126.784327] CPU: 0 PID: 26439 Comm: syz-executor5 Not tainted 5.0.0-rc1+ #18 [ 1126.784338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.784345] Call Trace: [ 1126.784367] dump_stack+0x1db/0x2d0 [ 1126.784387] ? dump_stack_print_info.cold+0x20/0x20 [ 1126.784417] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1126.784444] print_address_description.cold+0x7c/0x20d [ 1126.824346] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1126.824370] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1126.834925] kasan_report.cold+0x1b/0x40 [ 1126.839000] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1126.844290] __asan_report_load8_noabort+0x14/0x20 [ 1126.844309] kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1126.844334] ? vcpu_stat_get_per_vm_open+0x40/0x40 [ 1126.859310] ? lock_downgrade+0x910/0x910 [ 1126.863462] ? lock_release+0xc40/0xc40 [ 1126.867465] kvm_vm_ioctl_clear_dirty_log+0xff/0x260 [ 1126.872644] ? kvm_vm_ioctl_get_dirty_log+0x260/0x260 [ 1126.877845] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1126.877862] ? _copy_from_user+0xdd/0x150 [ 1126.877890] kvm_vm_ioctl+0xc19/0x1fe0 [ 1126.877904] ? __lock_acquire+0x572/0x4a30 [ 1126.877921] ? kasan_check_read+0x11/0x20 [ 1126.877938] ? do_raw_spin_unlock+0xa0/0x330 [ 1126.877956] ? kvm_unregister_device_ops+0x70/0x70 [ 1126.877977] ? mark_held_locks+0x100/0x100 [ 1126.887667] ? get_futex_key+0x2050/0x2050 [ 1126.887690] ? add_lock_to_list.isra.0+0x450/0x450 [ 1126.922864] ? mark_held_locks+0x100/0x100 [ 1126.927118] ? __fget+0x472/0x710 [ 1126.930755] ? find_held_lock+0x35/0x120 [ 1126.934824] ? __fget+0x472/0x710 [ 1126.938289] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1126.943840] ? lock_downgrade+0x910/0x910 [ 1126.947991] ? kasan_check_read+0x11/0x20 [ 1126.952148] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1126.957441] ? rcu_read_unlock_special+0x380/0x380 [ 1126.962403] ? __fget+0x499/0x710 [ 1126.965882] ? iterate_fd+0x4b0/0x4b0 [ 1126.969681] ? lock_release+0xc40/0xc40 [ 1126.973662] ? kvm_unregister_device_ops+0x70/0x70 [ 1126.978608] do_vfs_ioctl+0x107b/0x17d0 [ 1126.982608] ? ioctl_preallocate+0x2f0/0x2f0 [ 1126.987030] ? smack_inode_setattr+0x290/0x290 [ 1126.991640] ? __fget_light+0x2db/0x420 [ 1126.995642] ? fget_raw+0x20/0x20 [ 1126.999105] ? put_timespec64+0x115/0x1b0 [ 1127.003282] ? nsecs_to_jiffies+0x30/0x30 [ 1127.007454] ? do_syscall_64+0x8c/0x800 [ 1127.011430] ? do_syscall_64+0x8c/0x800 [ 1127.015408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1127.020955] ? security_file_ioctl+0x93/0xc0 [ 1127.025368] ksys_ioctl+0xab/0xd0 [ 1127.028827] __x64_sys_ioctl+0x73/0xb0 [ 1127.032766] do_syscall_64+0x1a3/0x800 [ 1127.036667] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1127.041616] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1127.046645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1127.051508] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.056709] RIP: 0033:0x457ec9 [ 1127.059935] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1127.078852] RSP: 002b:00007f96f50cdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1127.086558] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 1127.093855] RDX: 0000000020000080 RSI: 00000000c018aec0 RDI: 0000000000000004 [ 1127.101119] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1127.108388] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96f50ce6d4 [ 1127.115655] R13: 00000000004ca068 R14: 00000000004d2b90 R15: 00000000ffffffff [ 1127.122952] [ 1127.124577] Allocated by task 26439: [ 1127.128324] save_stack+0x45/0xd0 [ 1127.131780] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1127.136711] kasan_kmalloc+0x9/0x10 [ 1127.140334] __kmalloc_node+0x4e/0x70 [ 1127.144133] kvmalloc_node+0x68/0x100 [ 1127.147948] __kvm_set_memory_region+0x1da1/0x2c40 [ 1127.152880] kvm_set_memory_region+0x2f/0x60 [ 1127.157288] kvm_vm_ioctl+0xafa/0x1fe0 [ 1127.161184] do_vfs_ioctl+0x107b/0x17d0 [ 1127.165193] ksys_ioctl+0xab/0xd0 [ 1127.168662] __x64_sys_ioctl+0x73/0xb0 [ 1127.172550] do_syscall_64+0x1a3/0x800 [ 1127.176440] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.181616] [ 1127.183242] Freed by task 25559: [ 1127.186607] save_stack+0x45/0xd0 [ 1127.190058] __kasan_slab_free+0x102/0x150 [ 1127.194292] kasan_slab_free+0xe/0x10 [ 1127.198089] kfree+0xcf/0x230 [ 1127.201209] smk_import_entry+0xc6/0x450 [ 1127.205274] smk_fetch.part.0+0xd9/0xf0 [ 1127.209253] smack_d_instantiate+0x8d2/0xe10 [ 1127.213663] security_d_instantiate+0x5d/0x100 [ 1127.218254] d_instantiate_new+0x70/0x160 [ 1127.222550] ext4_add_nondir+0x83/0x90 [ 1127.226446] ext4_symlink+0x75c/0xee0 [ 1127.230255] vfs_symlink+0x378/0x5d0 [ 1127.233967] do_symlinkat+0x239/0x2c0 [ 1127.237765] __x64_sys_symlink+0x59/0x80 [ 1127.241830] do_syscall_64+0x1a3/0x800 [ 1127.245729] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.250947] [ 1127.252609] The buggy address belongs to the object at ffff8880903d4e00 [ 1127.252609] which belongs to the cache kmalloc-32 of size 32 [ 1127.265087] The buggy address is located 16 bytes inside of [ 1127.265087] 32-byte region [ffff8880903d4e00, ffff8880903d4e20) [ 1127.276776] The buggy address belongs to the page: [ 1127.281709] page:ffffea000240f500 count:1 mapcount:0 mapping:ffff88812c3f01c0 index:0xffff8880903d4fc1 [ 1127.291151] flags: 0x1fffc0000000200(slab) [ 1127.295392] raw: 01fffc0000000200 ffffea00028fe1c8 ffffea00029e8508 ffff88812c3f01c0 [ 1127.303277] raw: ffff8880903d4fc1 ffff8880903d4000 000000010000003a 0000000000000000 [ 1127.311152] page dumped because: kasan: bad access detected [ 1127.316867] [ 1127.318484] Memory state around the buggy address: [ 1127.323417] ffff8880903d4d00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 1127.330771] ffff8880903d4d80: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc [ 1127.338148] >ffff8880903d4e00: 00 00 fc fc fc fc fc fc fb fb fb fb fc fc fc fc [ 1127.345518] ^ [ 1127.349400] ffff8880903d4e80: 00 00 01 fc fc fc fc fc fb fb fb fb fc fc fc fc [ 1127.356755] ffff8880903d4f00: fb fb fb fb fc fc fc fc fb fb fb fb fc fc fc fc 19:57:24 executing program 2: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 19:57:24 executing program 0: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) [ 1127.364121] ================================================================== [ 1127.371470] Disabling lock debugging due to kernel taint [ 1127.377156] Kernel panic - not syncing: panic_on_warn set ... [ 1127.383062] CPU: 0 PID: 26439 Comm: syz-executor5 Tainted: G B 5.0.0-rc1+ #18 [ 1127.391639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.400985] Call Trace: [ 1127.403576] dump_stack+0x1db/0x2d0 [ 1127.407204] ? dump_stack_print_info.cold+0x20/0x20 [ 1127.412250] panic+0x2cb/0x65c [ 1127.415449] ? add_taint.cold+0x16/0x16 [ 1127.419432] ? trace_hardirqs_on+0xb4/0x310 [ 1127.423754] ? trace_hardirqs_on+0xb4/0x310 [ 1127.428079] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1127.433355] end_report+0x47/0x4f [ 1127.436807] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1127.442097] kasan_report.cold+0xe/0x40 [ 1127.446088] ? kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1127.451387] __asan_report_load8_noabort+0x14/0x20 [ 1127.456334] kvm_clear_dirty_log_protect+0x8cf/0x970 [ 1127.461446] ? vcpu_stat_get_per_vm_open+0x40/0x40 [ 1127.466380] ? lock_downgrade+0x910/0x910 [ 1127.470533] ? lock_release+0xc40/0xc40 [ 1127.474521] kvm_vm_ioctl_clear_dirty_log+0xff/0x260 [ 1127.479627] ? kvm_vm_ioctl_get_dirty_log+0x260/0x260 [ 1127.484819] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1127.490389] ? _copy_from_user+0xdd/0x150 [ 1127.494568] kvm_vm_ioctl+0xc19/0x1fe0 [ 1127.498459] ? __lock_acquire+0x572/0x4a30 [ 1127.502701] ? kasan_check_read+0x11/0x20 [ 1127.506851] ? do_raw_spin_unlock+0xa0/0x330 [ 1127.511261] ? kvm_unregister_device_ops+0x70/0x70 [ 1127.516186] ? mark_held_locks+0x100/0x100 [ 1127.520422] ? get_futex_key+0x2050/0x2050 [ 1127.524672] ? add_lock_to_list.isra.0+0x450/0x450 [ 1127.529608] ? mark_held_locks+0x100/0x100 [ 1127.533862] ? __fget+0x472/0x710 [ 1127.537318] ? find_held_lock+0x35/0x120 [ 1127.541380] ? __fget+0x472/0x710 [ 1127.544832] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1127.550377] ? lock_downgrade+0x910/0x910 [ 1127.554522] ? kasan_check_read+0x11/0x20 [ 1127.558671] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 1127.563950] ? rcu_read_unlock_special+0x380/0x380 [ 1127.568904] ? __fget+0x499/0x710 [ 1127.572374] ? iterate_fd+0x4b0/0x4b0 [ 1127.576169] ? lock_release+0xc40/0xc40 [ 1127.580142] ? kvm_unregister_device_ops+0x70/0x70 [ 1127.585072] do_vfs_ioctl+0x107b/0x17d0 [ 1127.589050] ? ioctl_preallocate+0x2f0/0x2f0 [ 1127.593458] ? smack_inode_setattr+0x290/0x290 [ 1127.598040] ? __fget_light+0x2db/0x420 [ 1127.602024] ? fget_raw+0x20/0x20 [ 1127.605505] ? put_timespec64+0x115/0x1b0 [ 1127.609653] ? nsecs_to_jiffies+0x30/0x30 [ 1127.613801] ? do_syscall_64+0x8c/0x800 [ 1127.617775] ? do_syscall_64+0x8c/0x800 [ 1127.621781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1127.627318] ? security_file_ioctl+0x93/0xc0 [ 1127.631726] ksys_ioctl+0xab/0xd0 [ 1127.635210] __x64_sys_ioctl+0x73/0xb0 [ 1127.639105] do_syscall_64+0x1a3/0x800 [ 1127.642997] ? syscall_return_slowpath+0x5f0/0x5f0 [ 1127.647931] ? prepare_exit_to_usermode+0x232/0x3b0 [ 1127.652949] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1127.657797] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1127.663000] RIP: 0033:0x457ec9 [ 1127.666207] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1127.685127] RSP: 002b:00007f96f50cdc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1127.692830] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457ec9 [ 1127.700094] RDX: 0000000020000080 RSI: 00000000c018aec0 RDI: 0000000000000004 [ 1127.707357] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1127.714625] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96f50ce6d4 [ 1127.721891] R13: 00000000004ca068 R14: 00000000004d2b90 R15: 00000000ffffffff [ 1127.730264] Kernel Offset: disabled [ 1127.733884] Rebooting in 86400 seconds..