ffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0xc0200, 0x0) syncfs(r1) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f00000000c0)=r2) [ 516.097957][ T2489] print_req_error: I/O error, dev loop4, sector 4096 flags 0 [ 516.105863][T18202] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 516.127896][T18202] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 516.142856][T18202] UDF-fs: Scanning with blocksize 4096 failed [ 516.170084][T18202] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xd9000000}) 06:02:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)={'syz0'}, 0x4) 06:02:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x68000000, 0x0) 06:02:09 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x82080) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000000c0)}) r1 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) r2 = dup2(r1, r1) ioctl$IMCTRLREQ(r2, 0x80044945, &(0x7f0000000000)={0x0, 0x3, 0x5, 0x7}) 06:02:09 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 516.690315][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 516.698263][T18440] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:09 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:09 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)={'syz0'}, 0x4) [ 516.743015][T18440] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 516.832190][T18440] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:02:09 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3db, 0x80) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f00000000c0)={0x3, 0xfffffffffffffff8, @value=0xd89}) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000100)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x200000, 0x0) accept4$netrom(r1, &(0x7f0000000180)={{0x3, @rose}, [@default, @bcast, @rose, @netrom, @remote, @remote, @null]}, &(0x7f0000000200)=0x48, 0x0) epoll_wait(r1, &(0x7f0000000140)=[{}], 0x1, 0x9) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)) [ 516.881677][T18440] UDF-fs: Scanning with blocksize 512 failed [ 516.907918][T18440] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 516.919665][T18440] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 516.930254][T18440] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:02:10 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x0) [ 516.980057][T18440] UDF-fs: Scanning with blocksize 1024 failed [ 517.019129][T18440] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:10 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x0) [ 517.080884][T18440] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 517.113355][T18440] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 517.139274][T18440] UDF-fs: Scanning with blocksize 2048 failed [ 517.165396][T18440] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:10 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.mems\x00', 0x2, 0x0) write$binfmt_misc(r1, 0x0, 0x0) [ 517.216297][T18440] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:02:10 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x80000001}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x800, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x90000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000140)={0x2a8, r2, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xd0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x10001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6gre0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @rand_addr=0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffe01}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x0, @empty, 0x42}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xffff, @loopback, 0x2}}}}]}, @TIPC_NLA_MEDIA={0xd8, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xea}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x300}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffc000000000}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffff}]}]}, 0x2a8}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) [ 517.279163][T18440] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 517.340935][T18440] UDF-fs: Scanning with blocksize 4096 failed [ 517.377673][T18440] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xda000000}) 06:02:10 executing program 1: 06:02:10 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:10 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x6c000000, 0x0) 06:02:10 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x40800) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="000000000000000059d1762e00000000"]) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x141000, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x2) 06:02:10 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:10 executing program 1: [ 517.896195][T18786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 517.926798][T18786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 517.970040][T18786] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:02:11 executing program 5: 06:02:11 executing program 1: [ 518.070052][T18786] UDF-fs: Scanning with blocksize 512 failed 06:02:11 executing program 5: [ 518.141676][T18786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 518.161187][T18786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 518.194802][T18786] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 518.218573][T18786] UDF-fs: Scanning with blocksize 1024 failed [ 518.247755][T18786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:11 executing program 1: 06:02:11 executing program 5: [ 518.317267][T18786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 518.351692][T18786] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 518.399936][T18786] UDF-fs: Scanning with blocksize 2048 failed [ 518.459251][T18786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 518.518577][T18786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 518.571182][T18786] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 518.584114][T18786] UDF-fs: Scanning with blocksize 4096 failed [ 518.592134][T18786] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xfe0f0000}) 06:02:11 executing program 5: 06:02:11 executing program 1: 06:02:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x70020000, 0x0) 06:02:11 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:11 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:11 executing program 1: 06:02:11 executing program 5: 06:02:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x74000000, 0x0) 06:02:12 executing program 5: 06:02:12 executing program 1: [ 519.139088][T18937] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:12 executing program 1: [ 519.302374][T18937] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 519.345115][T18937] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 519.386624][T18937] UDF-fs: Scanning with blocksize 512 failed [ 519.412782][T18937] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 519.452237][T18937] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 519.477800][T18937] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 519.495459][T18937] UDF-fs: Scanning with blocksize 1024 failed [ 519.502503][T18922] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 519.515072][T18937] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 519.561766][T18922] FAT-fs (loop3): Filesystem has been set read-only [ 519.568949][T18937] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 519.578630][T18924] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 519.589664][T18924] FAT-fs (loop2): Filesystem has been set read-only [ 519.597418][T18922] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 519.604485][T18924] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 519.613351][T18937] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 519.621949][T18937] UDF-fs: Scanning with blocksize 2048 failed [ 519.628967][T18937] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 519.642155][T18937] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 519.652748][T18937] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 519.660660][T18937] UDF-fs: Scanning with blocksize 4096 failed [ 519.667492][T18937] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xfffa08f38f0}) 06:02:12 executing program 5: 06:02:12 executing program 1: 06:02:12 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:12 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x7a000000, 0x0) 06:02:13 executing program 1: [ 519.987957][T18957] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:13 executing program 5: [ 520.045791][T18957] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 520.121821][T18957] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:02:13 executing program 5: 06:02:13 executing program 1: [ 520.181393][T18957] UDF-fs: Scanning with blocksize 512 failed [ 520.220881][T18957] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 520.284810][T18957] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:02:13 executing program 5: [ 520.345475][T18957] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:02:13 executing program 1: [ 520.388335][T18957] UDF-fs: Scanning with blocksize 1024 failed [ 520.438055][T18957] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 520.447471][T18959] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 520.481859][T18957] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 520.498559][T18959] FAT-fs (loop3): Filesystem has been set read-only [ 520.522493][T18959] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 520.567834][T18957] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 520.587646][T18957] UDF-fs: Scanning with blocksize 2048 failed [ 520.615204][T18957] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 520.645890][T18957] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 520.666056][T18957] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 520.691676][T18957] UDF-fs: Scanning with blocksize 4096 failed [ 520.700221][T18957] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xffffffff000}) 06:02:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) 06:02:14 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) 06:02:14 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x8cffffff, 0x0) 06:02:14 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xc0ed0000, 0x0) 06:02:14 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 521.232133][ T2488] print_req_error: 47 callbacks suppressed [ 521.232146][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 521.245865][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 521.263573][T19044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:14 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff2f, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x1, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) [ 521.305524][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 521.314169][T19044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 521.331622][T19044] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 521.379416][T19044] UDF-fs: Scanning with blocksize 512 failed [ 521.416474][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 521.425851][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 521.435119][T19044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 521.462230][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 521.470609][T19044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:02:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x15555555555555b5, 0x0, 0x0, 0x8a) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x3, 0x400, 0x0, 0x0, 0x0, 0x4cb]}) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0x0, 0x8}, 0x20) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 521.506176][T19044] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 521.526145][T19044] UDF-fs: Scanning with blocksize 1024 failed [ 521.535484][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 521.543801][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 521.552240][T19044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 521.588640][ T2488] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 521.598376][T19044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 521.620766][T19044] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 521.630663][T19044] UDF-fs: Scanning with blocksize 2048 failed [ 521.643167][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 06:02:14 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f00000000c0)) [ 521.653119][T19044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 521.667588][T19044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 521.683438][T19044] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 521.696609][T19044] UDF-fs: Scanning with blocksize 4096 failed [ 521.704507][T19044] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf5ffffff, 0x0) 06:02:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xc7020000000000}) 06:02:15 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:15 executing program 3: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:15 executing program 1: 06:02:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf6ffffff, 0x0) 06:02:15 executing program 5: 06:02:15 executing program 5: 06:02:15 executing program 1: 06:02:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf9fdffff, 0x0) 06:02:15 executing program 5: 06:02:15 executing program 1: 06:02:15 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 522.803277][T19248] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 522.817802][T19248] FAT-fs (loop3): Filesystem has been set read-only [ 522.830981][T19248] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 06:02:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xf0ffffff0f0000}) 06:02:16 executing program 5: 06:02:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfeff0000, 0x0) 06:02:16 executing program 1: 06:02:16 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:16 executing program 5: 06:02:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xff0f0000, 0x0) 06:02:16 executing program 1: 06:02:16 executing program 5: 06:02:16 executing program 1: 06:02:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffff000, 0x0) 06:02:16 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x2449920400000000}) 06:02:17 executing program 5: 06:02:17 executing program 1: 06:02:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffffdf9, 0x0) 06:02:17 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:17 executing program 1: 06:02:17 executing program 5: 06:02:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffffe00, 0x0) 06:02:17 executing program 1: 06:02:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xffffff7f, 0x0) 06:02:17 executing program 5: 06:02:17 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x3f00000000000000}) 06:02:18 executing program 1: 06:02:18 executing program 5: 06:02:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xffffff8c, 0x0) 06:02:18 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:18 executing program 1: 06:02:18 executing program 5: 06:02:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffffff5, 0x0) 06:02:18 executing program 5: 06:02:18 executing program 1: 06:02:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffffff6, 0x0) 06:02:18 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xd900000000000000}) 06:02:19 executing program 5: 06:02:19 executing program 1: 06:02:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xedc000000000, 0x0) 06:02:19 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:19 executing program 1: 06:02:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x1000000000000, 0x0) 06:02:19 executing program 5: 06:02:19 executing program 1: 06:02:19 executing program 5: 06:02:19 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x2000000000000, 0x0) 06:02:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xda00000000000000}) 06:02:20 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) 06:02:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x3) ioctl$TCGETS(r0, 0x542e, 0x0) 06:02:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x6000000000000, 0x0) 06:02:20 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xe000000000000, 0x0) 06:02:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) 06:02:20 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf0ffffffffffff, 0x0) 06:02:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfeffff00000000, 0x0) 06:02:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x100000000000000, 0x0) 06:02:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) [ 528.132386][T19544] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 528.160329][T19544] FAT-fs (loop2): Filesystem has been set read-only [ 528.204236][T19544] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:02:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xf0388fa0ff0f0000}) 06:02:21 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:21 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0x0, 0x0, 0x142800) 06:02:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x200000000000000, 0x0) 06:02:21 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x300000000000000, 0x0) 06:02:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x400000000000000, 0x0) 06:02:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x500000000000000, 0x0) 06:02:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x600000000000000, 0x0) 06:02:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x700000000000000, 0x0) [ 529.140047][T19680] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 529.161033][T19680] FAT-fs (loop2): Filesystem has been set read-only [ 529.176979][T19680] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:02:22 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 530.302806][ T7836] Bluetooth: hci0: command 0x1003 tx timeout [ 530.309494][T19672] Bluetooth: hci0: sending frame failed (-49) [ 532.381626][ T5] Bluetooth: hci0: command 0x1001 tx timeout [ 532.387769][T19672] Bluetooth: hci0: sending frame failed (-49) [ 534.461585][ T7836] Bluetooth: hci0: command 0x1009 tx timeout 06:02:31 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x900000000000000, 0x0) 06:02:31 executing program 1: mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, 0x0) chroot(&(0x7f0000000940)='./file0\x00') mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000300)='./file0\x00') pivot_root(&(0x7f00000004c0)='.\x00', &(0x7f0000000200)='./file0\x00') 06:02:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xfe0f000000000000}) 06:02:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:31 executing program 2: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xa00000000000000, 0x0) 06:02:31 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xc00000000000000, 0x0) 06:02:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x2000000000000000, 0x0) 06:02:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x2010000000000000, 0x0) 06:02:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x2300000000000000, 0x0) 06:02:32 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:32 executing program 2: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0xffffffff00000000}) 06:02:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x3300000000000000, 0x0) [ 540.351981][T19772] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 540.366915][T19772] FAT-fs (loop2): Filesystem has been set read-only [ 540.377120][T19772] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 540.941543][ T5] Bluetooth: hci0: command 0x1003 tx timeout [ 540.947670][T19672] Bluetooth: hci0: sending frame failed (-49) [ 543.021675][ T3480] Bluetooth: hci0: command 0x1001 tx timeout [ 543.027862][T19672] Bluetooth: hci0: sending frame failed (-49) [ 545.101690][ T5] Bluetooth: hci0: command 0x1009 tx timeout 06:02:42 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x3400000000000000, 0x0) 06:02:42 executing program 2: perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:02:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:42 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x3801000000000000, 0x0) [ 549.235756][T12443] Bluetooth: hci0: Frame reassembly failed (-84) 06:02:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x3f00000000000000, 0x0) 06:02:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x4000000000000000, 0x0) 06:02:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x4800000000000000, 0x0) [ 549.778565][T19797] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 549.790594][T19797] FAT-fs (loop1): Filesystem has been set read-only [ 549.807352][T19797] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 549.842707][T19799] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 549.879623][T19799] FAT-fs (loop3): Filesystem has been set read-only 06:02:42 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 549.892161][T19799] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 06:02:42 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:02:42 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x4c00000000000000, 0x0) 06:02:42 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x6000000000000000, 0x0) 06:02:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x6800000000000000, 0x0) [ 551.261534][ T5] Bluetooth: hci0: command 0x1003 tx timeout [ 551.267708][T19672] Bluetooth: hci0: sending frame failed (-49) [ 553.341615][ T5] Bluetooth: hci0: command 0x1001 tx timeout [ 553.347740][T19672] Bluetooth: hci0: sending frame failed (-49) [ 555.421626][ T5] Bluetooth: hci0: command 0x1009 tx timeout 06:02:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x6c00000000000000, 0x0) 06:02:52 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:52 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:02:52 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:02:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x7002000000000000, 0x0) 06:02:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x7400000000000000, 0x0) 06:02:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x7a00000000000000, 0x0) 06:02:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x8000000000000000, 0x0) 06:02:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:53 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:53 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x8cffffff00000000, 0x0) 06:02:53 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:02:53 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:02:53 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:02:53 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:02:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf5ffffff00000000, 0x0) 06:02:53 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:02:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf6ffffff00000000, 0x0) 06:02:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xf9fdffff00000000, 0x0) [ 561.056074][T20043] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 561.081783][T20043] FAT-fs (loop1): Filesystem has been set read-only [ 561.090992][T20043] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) 06:02:54 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfeff000000000000, 0x0) 06:02:54 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:02:54 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:02:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xff0f000000000000, 0x0) 06:02:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xffffff7f00000000, 0x0) 06:02:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xffffffff00000000, 0x0) [ 561.964886][T20092] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 562.008907][T20092] FAT-fs (loop3): Filesystem has been set read-only [ 562.059654][T20092] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 06:02:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffffffffffff000, 0x0) 06:02:55 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:55 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:02:55 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xffffffffffffffff, 0x0) 06:02:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:55 executing program 4: chmod(&(0x7f0000000040)='./file0\x00', 0x2f) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='/&\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:02:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:55 executing program 4: creat(&(0x7f0000000100)='./file1\x00', 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7fffffff, 0x101040) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f64650500000000000000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:02:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000100)=0x5b) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000180)={0x200}, 0x4) 06:02:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x0) [ 562.997096][ T2488] print_req_error: 2 callbacks suppressed [ 562.997108][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 563.010550][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 563.018052][T20169] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 563.051895][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 563.059543][T20169] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 563.090081][T20169] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 563.128446][T20169] UDF-fs: Scanning with blocksize 512 failed [ 563.194904][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 563.211920][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 563.219364][T20169] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:56 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 06:02:56 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 563.255269][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 563.269011][T20169] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:02:56 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:02:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) ioctl$KDADDIO(r0, 0x400455c8, 0x0) [ 563.297049][T20169] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 563.321682][T20169] UDF-fs: Scanning with blocksize 1024 failed [ 563.348364][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 563.411813][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 563.419411][T20169] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 563.544875][ T2488] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 563.556398][T20169] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:02:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) ioctl$KDADDIO(r0, 0x400455c8, 0x0) [ 563.709522][T20169] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 563.771599][T20169] UDF-fs: Scanning with blocksize 2048 failed [ 563.779676][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 563.815524][T20169] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) [ 563.927115][T20169] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 564.002112][T20169] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 564.054726][T20169] UDF-fs: Scanning with blocksize 4096 failed [ 564.095572][T20169] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:57 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) [ 564.178570][T20170] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 564.262421][T20170] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 564.282244][T20170] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 564.295010][T20197] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 564.302470][T20170] UDF-fs: Scanning with blocksize 512 failed [ 564.320974][T20197] FAT-fs (loop2): Filesystem has been set read-only [ 564.355937][T20170] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 564.385305][T20197] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 564.415872][T20170] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 564.431962][T20170] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 564.439640][T20170] UDF-fs: Scanning with blocksize 1024 failed [ 564.461144][T20170] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 564.471222][T20170] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 564.481569][T20170] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 564.489359][T20170] UDF-fs: Scanning with blocksize 2048 failed [ 564.496476][T20170] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 564.521285][T20170] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:02:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:02:57 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2fe465762f6c6f6f703000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x100000001, 0x5, 0x4], 0x3, 0x400, 0x8, 0x2, 0x9f9, 0x1, {0xf3, 0x4, 0x8000, 0x7f, 0x7fff, 0x800, 0x5, 0x7ff, 0xfffffffffffff8a0, 0x1000, 0x6, 0x4, 0x800, 0x200, "423b3dfeee3f02bea34be533ed9a5f387747b954d14a78b7f0f853b8f56d2318"}}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=""/13, 0x36d) 06:02:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x0) 06:02:57 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 564.532437][T20170] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 564.540187][T20170] UDF-fs: Scanning with blocksize 4096 failed [ 564.546962][T20170] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:57 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:57 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x10000000000) mount(&(0x7f0000000100)=ANY=[@ANYRESDEC], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='udf\x00', 0x0, 0x0) 06:02:58 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:58 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200000) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x48084) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:02:58 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 565.229197][T20228] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 565.303352][T20228] FAT-fs (loop1): Filesystem has been set read-only [ 565.324355][T20228] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 565.350251][T20360] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 565.392836][T20360] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 565.423979][T20360] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:02:58 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:58 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:02:58 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 565.476494][T20360] UDF-fs: Scanning with blocksize 512 failed [ 565.548934][T20360] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 565.571112][T20360] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 565.592164][T20360] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 565.600972][T20360] UDF-fs: Scanning with blocksize 1024 failed [ 565.633451][T20360] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 565.672338][T20360] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 565.753450][T20360] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 565.802432][T20360] UDF-fs: Scanning with blocksize 2048 failed [ 565.835604][T20360] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 565.932669][T20360] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 565.949290][T20469] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 565.958870][T20360] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 565.967824][T20469] FAT-fs (loop1): Filesystem has been set read-only 06:02:59 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 565.977028][T20469] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 565.986026][T20360] UDF-fs: Scanning with blocksize 4096 failed [ 566.017695][T20360] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:59 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:02:59 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 566.116100][T20588] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 566.184903][T20588] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 566.241818][T20588] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 566.295240][T20588] UDF-fs: Scanning with blocksize 512 failed [ 566.349027][T20588] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:02:59 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 566.396303][T20588] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 566.471711][T20588] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 566.479380][T20588] UDF-fs: Scanning with blocksize 1024 failed 06:02:59 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 566.593206][T20588] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 566.625696][T20588] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:02:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 566.636373][T20588] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 566.654273][T20588] UDF-fs: Scanning with blocksize 2048 failed [ 566.715427][T20588] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 566.741188][T20588] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 566.806098][T20588] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 566.844868][T20588] UDF-fs: Scanning with blocksize 4096 failed [ 566.872115][T20588] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:02:59 executing program 4: openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x100) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f04000000000000003000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) write(r0, &(0x7f0000000180)="61df02ad24a4eeca368d4a4d8e7458cb057927f236df32f5a08f2f4e60854bb93f68b4aac8d4109a4a934db1daa7f0e96b33fa8157ca205380dbeaabb482d00e2112f38d539fc8d80ee60dcd55b8bb878829c085d6308cb3f633883395e10f816baef2da18d49acca63240f19d95", 0x6e) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000080)=0x175) 06:02:59 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:00 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6451762f6c6f6fb0703000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:00 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:00 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:00 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x40204) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 567.374417][T20775] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 567.432510][T20775] FAT-fs (loop2): Filesystem has been set read-only [ 567.451069][T20775] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:03:00 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 567.547583][T21054] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:00 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:00 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 567.588934][T21054] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 567.622855][T21054] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 567.658005][T21054] UDF-fs: Scanning with blocksize 512 failed [ 567.708229][T21054] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 567.741901][T21054] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 567.806658][T21054] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 567.899250][T21054] UDF-fs: Scanning with blocksize 1024 failed [ 567.920032][T21054] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 567.942378][T21054] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 567.980954][T21054] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:01 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 568.072474][T21054] UDF-fs: Scanning with blocksize 2048 failed [ 568.080946][ T2489] print_req_error: 47 callbacks suppressed [ 568.080957][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 568.096890][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 568.105032][T21054] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:01 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 568.158949][ T2489] print_req_error: I/O error, dev loop4, sector 4096 flags 0 [ 568.167228][T21054] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 568.186122][T21054] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 568.194185][T21054] UDF-fs: Scanning with blocksize 4096 failed [ 568.200585][T21054] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:01 executing program 4: fstat(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1000, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000100)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='/de\x00'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='ext4\x00', 0x0, 0x0) 06:03:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x13) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=@random={'user.', '[\x00'}, &(0x7f0000000240)='/dev/loop', 0x9, 0x0) 06:03:01 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:01 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:01 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 568.793602][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 568.838583][ T2489] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 568.851080][T21296] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 568.908654][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 568.917446][T21296] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:02 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 569.015793][T21296] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 569.089006][T21296] UDF-fs: Scanning with blocksize 512 failed [ 569.115016][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 569.153236][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 569.161837][T21296] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:02 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 569.212692][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 569.220744][T21296] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 569.245646][T21296] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:02 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 569.262380][T21296] UDF-fs: Scanning with blocksize 1024 failed [ 569.269788][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 569.283714][T21296] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 569.298328][T21296] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 569.310433][T21296] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 569.324691][T21296] UDF-fs: Scanning with blocksize 2048 failed [ 569.340130][T21296] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 569.383323][T21296] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 569.399410][T21296] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 569.407386][T21296] UDF-fs: Scanning with blocksize 4096 failed [ 569.413715][T21296] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x3, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000100)=0x660da91d) 06:03:02 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 569.653064][T21530] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 569.773325][T21530] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:02 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:02 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 569.826328][T21530] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 569.878086][T21530] UDF-fs: Scanning with blocksize 512 failed [ 569.947997][T21530] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 569.991005][T21530] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 570.063383][T21530] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 570.117974][T21530] UDF-fs: Scanning with blocksize 1024 failed [ 570.167543][T21530] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 570.220662][T21530] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:03 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 570.312078][T21530] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 570.344883][T21530] UDF-fs: Scanning with blocksize 2048 failed [ 570.397930][T21530] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 570.425646][T21534] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 570.447002][T21530] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 570.538231][T21534] FAT-fs (loop5): Filesystem has been set read-only [ 570.567947][T21530] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 570.638344][T21534] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) [ 570.696052][T21545] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 570.709080][T21530] UDF-fs: Scanning with blocksize 4096 failed 06:03:03 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 570.742092][T21530] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 570.755159][T21545] FAT-fs (loop2): Filesystem has been set read-only 06:03:03 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 570.785307][T21545] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 570.797176][T21538] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 570.821138][T21538] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:03 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 570.895825][T21538] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 570.936518][T21538] UDF-fs: Scanning with blocksize 512 failed [ 570.967827][T21538] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 570.999219][T21538] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 571.026137][T21554] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 06:03:04 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 571.056869][T21538] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 571.108475][T21554] FAT-fs (loop3): Filesystem has been set read-only [ 571.122940][T21538] UDF-fs: Scanning with blocksize 1024 failed [ 571.167863][T21538] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 571.184021][T21554] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 571.227798][T21538] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 571.269134][T21538] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 571.291957][T21538] UDF-fs: Scanning with blocksize 2048 failed [ 571.307443][T21538] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:04 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 571.330027][T21538] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 571.352341][T21538] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 571.393608][T21538] UDF-fs: Scanning with blocksize 4096 failed [ 571.415391][T21538] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x10) mount(&(0x7f00000001c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x4, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001800)='/proc/capi/capi20\x00', 0x10000003, 0x0) getsockname$packet(r0, &(0x7f0000001700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001740)=0x14) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x181600, 0x0) sendmsg$kcm(r1, &(0x7f0000002c80)={&(0x7f0000001780)=@l2={0x1f, 0x9, {0xff, 0xfc8, 0x1, 0x4, 0x3, 0x6}, 0x369, 0x9}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001840)="1cb64cb90867761adf7a08a1ff545e0484fd12fec0f902c9363a68918ce79f1c53d85ab7bfa62155355513b8946e46f3208f898e7293d443d10c41d1d5260d00581b6debf08ac109546680b330aaede45fd9eb91e7972a7264ee322fff01461e512320f658458e4302489d7d79bc62247668881d5d5086f2533fe310e65884936387105f3bc1902ddc6af660c4a4743dcdca7e2d3d42633be589b24c955222a72e3c9210ad72e92acda2918891afb142c5e0ec97b3ab2c9e522e97a115aee7c6d69a2fb58ae507cbd0", 0xc9}, {&(0x7f0000001940)="79bb085a94266e6b0e3937b5be9bdb8b41e9bb4618540750272a3340b2db54f714d91265434d655d07f6a7b48a3146a9ef71fbbdb1e21f5a64ce7db9b1e735418191c3", 0x43}, {&(0x7f00000019c0)="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", 0x1000}, {&(0x7f00000029c0)="d0a86159e07b4fc529d0e88efc345ac8318df44b44b83c5777eda4cf7f0344efc31f0f7e7fb44b2db602564010b8093315ef8edf118e82f40f4217dd8334eba6c5b21fa1d53bace329e219ec698de657afa43b5342290a2e55da843af3a23f8d98d0dd4483758caf15ec4fde3944e252db8615f094850fccc4f2b30779ad05d15b9778e5356bf22823c9c1ab32106f62fd4259d50b7c7436769529f6706f8d72a73cc7c56f0da711405b8a7c656c89a09d82e9c631dd960ba939f597159874d819f75588b2d337aa82e4a90b7aa2344be52be334a3", 0xd5}, {&(0x7f00000016c0)="b5d96725cba0b7c0f9d1813a477925367e4c5a2653fa01b130b1429a34cc4428", 0x20}, {&(0x7f0000002ac0)="f5dcf0cc985f27e6f277cd02a8f7c715d86f8ba4b2cf5301f7159c6c0e5b92bc1aace94bb96159ef35bc6769ec91516d29681b5b", 0x34}, {&(0x7f0000002b00)="f607a749e245", 0x6}], 0x7, &(0x7f0000002bc0)=ANY=[@ANYBLOB="70000000000000008808000000100000067cc2527ac2752e9a2b23ffb3684c1724935b02874cb19e28239ee883e2ec5cb821fcc558f997f407384c79b9bfbd7acc4e9a497de2ed9738aa951a7b527384cee478a80161d413b9652d8b7a11380fbc8459d4105dbd200f2400000000000040000000000000001e010000070000003cb2d3e409f1321bb9e4ca25d8e3f0e704c340df3f1592108732d0d7a83cfe8e90b0131f04274a1aa0d5e74100000000"], 0xb0}, 0x0) sendmsg$kcm(r1, &(0x7f0000001680)={&(0x7f00000000c0)=@x25={0x9, @remote={[], 0x0}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000000140)="fd86e854866e311d2f6aedd864f1cf3e0701de0182234a735c5a8ecf5ecc325af712bacf15a6b935b99569a644f87d689bfd88fd66f2d4c2be76bb126b6eff9b859883fe9d1ef5ab3dc6be1548800dc4bdfae2", 0x53}, {&(0x7f0000001240)="317f1dbe44a923558a7627e3613d77d228ffce011f9b05159ec0c7a034d0e6b61de3091eb4b433c99fc5e50245ed3dd61b90766e033e7da7cc6c34f4b9a41444bfe0791af024c409add68db2b907d28bf0650512b8cd9112183de50f115cb1df1ce57d508d826a28bdd7d7b9308a2ff64f0a05c5fff2bb2d358bbe2f7ab9f5759324e332f2de556fa9e149dde0a5f0ba9816497b1a", 0x95}, {&(0x7f0000001300)="066d2cb05457727c165953bf3308037f708416c36ed4203aa7c0bf1a6011a789fee8cae99ff3ffa3da42e744f56ef001f15c166ffcdaa4447623e4ed4bdf4b68a2798889e52ef6e50d3a0d13d2323de2a01a116daf0f61b1142c8fcf2d67d56f33e0b7fe33714ea04b05e4acefde01df19f8126944a0", 0x76}], 0x4, &(0x7f00000013c0)=[{0xd8, 0x118, 0xd34f, "49121abb28ba65348c31dbddaf7ee1ed5ba81589babbe81f0c4c0c89128c88adf926a156cdd84a73dca3645a7df0402e952c1a24cfe11d523394aa3cffc850e6fa82a8ff2e3f19c276fad0be8f55b7a21fcc5a3d50dfc33508c09af055d9b06e47b0f16820e17e9e530b224acdbc1cc2cc6388f32323d32fb36380c0e8c4e39a2774e706d3d1ebc67c4af5910820e3c78e11755245c4f770ea69cf500a3cd96c2294191980673f12f2065bc43b7e27cb42d4b0469776ad85b0156c472632f0bc659ae2aa1de3"}, {0x50, 0x13b, 0x5, "d394a60276de9db8f332df692f1a6ee4f080adc230679f53badf7fbe7b70d18453d0d11e20faf06bc7c41e12ebb0d68bd4fb74be459d1c58a1"}, {0xb0, 0x103, 0x8001, "77db387b47e02f6bd4ff75cd538e0be89222968a26cceed2df1d8bee93f3e96721555fb1c3c3c6ab37e3138a40a7bd0ad1206105c7b8228277014ddb1ed814bb975ec3259d583db0645b0493f7ffa78580f29bc6ee45634168d7231ffc452077563e876030078b43020d14479838613a0d73a2ccb62517d9ec188c9f7dd89588daa1197c94a7aaf7f3a2d2466299a741a60a3bc60962719e1f"}, {0x48, 0x1, 0x1000, "1c40d5f893798a5403f55af6b52407d7e076feb02b263844ae0c372e1985cafed629ca0d136246d53c52052a19394c71d92dd99f284a7b7f"}, {0x68, 0x102, 0x4, "5dbac1a5bf653f7554c22e3490f6ca0f0b3a42f6d8fbb6d63c9eee47cf824b4e867b3d55e723c49e8bcd24aae48a47dcf9f45cfaa42ddda2c3c1ec9f905507d9c617f3b68c0c6af0720ce2798b9900866252"}], 0x288}, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000002cc0)='/dev/nbd') 06:03:04 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 571.637629][T21793] QAT: Invalid ioctl 06:03:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:03:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') 06:03:04 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:04 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:04 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 571.891842][T21864] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 571.922046][T21864] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:04 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 571.956188][T21864] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 571.974253][T21864] UDF-fs: Scanning with blocksize 512 failed [ 572.101901][T21864] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 572.171643][T21864] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 572.262971][T21864] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 572.372903][T21864] UDF-fs: Scanning with blocksize 1024 failed [ 572.394202][T21864] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 572.480471][T21924] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 572.496955][T21864] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 572.510543][T21864] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 572.518676][T21924] FAT-fs (loop5): Filesystem has been set read-only [ 572.543554][T21864] UDF-fs: Scanning with blocksize 2048 failed [ 572.567510][T21864] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 572.598067][T21924] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) [ 572.619925][T21864] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 572.648169][T21864] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 572.672121][T21864] UDF-fs: Scanning with blocksize 4096 failed [ 572.682346][T21864] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:05 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="f819"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 572.800487][T21927] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) 06:03:05 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 572.854456][T21927] FAT-fs (loop1): Filesystem has been set read-only 06:03:05 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @broadcast}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) getresgid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) getgroups(0x5, &(0x7f0000000440)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee01, 0xee01]) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000780)={0x0, {0x2, 0x4e20, @remote}, {0x2, 0x4e24, @remote}, {0x2, 0x4e21, @remote}, 0x18a, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x4, 0x0, 0x2}) lstat(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f00000006c0)=[0xee00, 0xffffffffffffffff, 0x0]) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, r0}], {0x4, 0x1}, [{0x8, 0x2, r1}, {0x8, 0x7, r2}, {0x8, 0x7, r3}, {0x8, 0x6, r5}, {0x8, 0x1, r6}, {0x8, 0x7, r7}, {0x8, 0x1, r8}], {0x10, 0x3}, {0x20, 0x4}}, 0x64, 0x3) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 572.898187][T21927] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) 06:03:06 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:03:06 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x40) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 573.244639][ T2488] print_req_error: 41 callbacks suppressed [ 573.244650][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 573.258877][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 573.268356][T22089] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 573.352570][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 573.360293][T22089] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:06 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 573.433704][T22089] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 573.495372][T22089] UDF-fs: Scanning with blocksize 512 failed [ 573.516194][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 573.574476][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 573.582317][T22089] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 573.612171][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 573.625794][T22089] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 573.731762][T22089] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 573.751373][T22089] UDF-fs: Scanning with blocksize 1024 failed [ 573.786771][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 573.795972][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 573.805069][T22089] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 573.847112][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 573.856300][T22089] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:06 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 573.889022][T22089] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 573.922043][T22089] UDF-fs: Scanning with blocksize 2048 failed 06:03:06 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:06 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 573.942701][T22067] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 573.958841][T22067] FAT-fs (loop1): Filesystem has been set read-only [ 573.975242][T22067] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) 06:03:07 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 573.992777][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 574.052991][T22089] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 574.083338][T22089] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 574.093581][T22089] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 574.101574][T22089] UDF-fs: Scanning with blocksize 4096 failed [ 574.107837][T22089] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 574.125500][T22288] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 574.256937][T22288] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 574.347179][T22288] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 574.409815][T22288] UDF-fs: Scanning with blocksize 512 failed [ 574.452465][T22288] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:07 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 574.494652][T22288] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 574.510354][T22288] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 574.520723][T22288] UDF-fs: Scanning with blocksize 1024 failed [ 574.545583][T22288] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 574.563059][T22288] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 574.614069][T22288] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:07 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 574.691716][T22288] UDF-fs: Scanning with blocksize 2048 failed [ 574.759431][T22288] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:07 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 574.841027][T22288] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:07 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:07 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 574.910517][T22288] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 574.923356][T22288] UDF-fs: Scanning with blocksize 4096 failed [ 574.995244][T22288] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:08 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:08 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 575.269402][T22573] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:08 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 575.353350][T22573] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 575.376415][T22573] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 575.386945][T22573] UDF-fs: Scanning with blocksize 512 failed [ 575.445345][T22573] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 575.486910][T22573] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:08 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 575.535670][T22573] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 575.574468][T22573] UDF-fs: Scanning with blocksize 1024 failed [ 575.631758][T22573] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 575.702193][T22573] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:08 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 575.818204][T22573] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:08 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x0, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:08 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 575.900279][T22573] UDF-fs: Scanning with blocksize 2048 failed [ 576.003443][T22573] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 576.092748][T22573] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 576.192850][T22573] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:09 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) write$rfkill(r0, &(0x7f0000000100)={0x254, 0x2, 0x1, 0x1, 0x1}, 0x8) mount(&(0x7f0000000280)=@md0='/dev/md0\x00', &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000300)='mqueue\x00', 0x0, 0x0) [ 576.250847][T22700] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 576.264302][T22573] UDF-fs: Scanning with blocksize 4096 failed [ 576.271596][T22573] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 576.280909][T22700] FAT-fs (loop1): Filesystem has been set read-only [ 576.292810][T22700] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) 06:03:09 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:09 executing program 4: setxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='security.evm\x00', &(0x7f00000001c0)=@ng={0x4, 0x6, "b4bf87a1bf887866ad9065b7"}, 0xe, 0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000100)={0x33, ""/51}) 06:03:09 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 576.679905][T22989] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 576.749830][T22989] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 576.776051][T22989] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:09 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x0, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 576.844586][T22989] UDF-fs: Scanning with blocksize 512 failed [ 576.895643][T22989] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 576.922548][T22989] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 576.937541][T22989] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 576.970678][T22989] UDF-fs: Scanning with blocksize 1024 failed [ 576.993754][T22989] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 577.024084][T22989] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:10 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 577.085779][T22989] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:10 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 577.141135][T22989] UDF-fs: Scanning with blocksize 2048 failed [ 577.186156][T22989] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 577.244151][T22989] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 577.302856][T22989] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:10 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 577.375694][T22989] UDF-fs: Scanning with blocksize 4096 failed [ 577.414014][T22989] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 577.507781][T23008] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:10 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 577.562091][T23008] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 577.591556][T23008] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 577.635711][T23008] UDF-fs: Scanning with blocksize 512 failed [ 577.678227][T23008] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 577.746258][T23008] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 577.803227][T23008] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 577.875990][T23008] UDF-fs: Scanning with blocksize 1024 failed 06:03:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:03:10 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x0, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 577.925657][T23008] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 577.989720][T23008] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 578.051264][T23008] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 578.104374][T23008] UDF-fs: Scanning with blocksize 2048 failed [ 578.132637][T23008] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:11 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 578.252722][ T2488] print_req_error: 49 callbacks suppressed [ 578.252748][ T2488] print_req_error: I/O error, dev loop4, sector 4096 flags 0 [ 578.268827][T23008] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 578.367956][T23008] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 578.382168][T23008] UDF-fs: Scanning with blocksize 4096 failed [ 578.408773][T23008] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 578.441323][T23245] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) 06:03:11 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:11 executing program 4: stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x10000, 0x0) getsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x402800) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000400)={0x0, 0x101}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={r2, 0x8003, 0x200, 0x2, 0x40, 0x3ff, 0x4, 0xd6a4, {0x0, @in6={{0xa, 0x4e21, 0x651d, @mcast1, 0xfffffffffffffffd}}, 0x6, 0x6cf6, 0x0, 0x1}}, &(0x7f0000000100)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000240)=r3, 0x4) 06:03:11 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 578.495524][T23245] FAT-fs (loop5): Filesystem has been set read-only [ 578.522073][T23245] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) [ 578.638117][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 578.656383][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 578.664153][T23271] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 578.742869][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 578.755427][T23271] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 578.821906][T23271] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 578.846633][T23271] UDF-fs: Scanning with blocksize 512 failed [ 578.913351][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 578.921766][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 578.931812][T23271] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 578.986807][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 578.997105][T23271] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:12 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 579.066744][T23271] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 579.108022][T23271] UDF-fs: Scanning with blocksize 1024 failed 06:03:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 579.148767][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 579.157795][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 579.166313][T23271] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:12 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 579.240393][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 579.248425][T23271] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 579.316652][T23271] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 579.351644][T23271] UDF-fs: Scanning with blocksize 2048 failed [ 579.415061][T23271] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:12 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:12 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 579.502120][T23271] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 579.535312][T23271] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 579.571690][T23271] UDF-fs: Scanning with blocksize 4096 failed [ 579.586618][T23271] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:12 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x80000, 0x0) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0xdf, 0x5, "76713b73f44f7f1e55c126bbfd201af57b5139260e8eb342330448627fb9f9895a93e0468fecc17ca0fdf0b6e10b4248201873cc441f9521c9d4e204256f4998044ad45b174c62d14dcb8ab31377ebf0d945441fb70f0ce2f2cdae21fbb42e6063dd943ddb677eae40e854015360b8161c9fc87804b1ccca104227416fde23cd45e7951bd122e2927098e73cdcc9aa6739705e81821622c0e52865a4d5ee9246c40e794a67d9abf1029814fff058f69f942835cdf48a407e4541095d0ef5ff7b7c313b6b473bbe294ce1c7aaf183768d9b68231a850d75"}, &(0x7f0000000280), 0x400) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xa8, r1, 0x0, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x40}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0xf}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x655}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfffffffffffffc01}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x841}, 0x0) [ 579.847799][T23317] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 579.920975][T23317] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:13 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 580.019020][T23317] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:13 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 580.066313][T23317] UDF-fs: Scanning with blocksize 512 failed [ 580.150632][T23293] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 580.186281][T23317] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 580.261424][T23293] FAT-fs (loop2): Filesystem has been set read-only [ 580.270197][T23317] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 580.307877][T23293] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 580.354690][T23317] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:13 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:13 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:13 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 580.423250][T23317] UDF-fs: Scanning with blocksize 1024 failed 06:03:13 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 580.563089][T23317] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 580.581928][T23317] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 580.601612][T23317] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 580.619023][T23317] UDF-fs: Scanning with blocksize 2048 failed [ 580.639950][T23317] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 580.652603][T23317] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 580.664340][T23317] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 580.736300][T23317] UDF-fs: Scanning with blocksize 4096 failed [ 580.753976][T23317] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:13 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='udf\x00', 0x2000, 0x0) 06:03:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40000) r1 = dup(0xffffffffffffff9c) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000100), 0x4) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x400, 0x0) r4 = signalfd(0xffffffffffffff9c, &(0x7f00000001c0)={0xfffffffffffffc00}, 0x8) r5 = accept4$unix(0xffffffffffffff9c, &(0x7f0000000200)=@abs, &(0x7f0000000280)=0x6e, 0x800) r6 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/video0\x00', 0x2, 0x0) r7 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/exec\x00', 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000340)=[r1, r2, r3, r4, r5, r6, r7], 0x7) 06:03:14 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 581.220296][T23720] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 581.287281][T23720] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:14 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) [ 581.359832][T23720] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 581.397336][T23720] UDF-fs: Scanning with blocksize 512 failed [ 581.420697][T23625] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 581.475318][T23720] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 581.476314][T23625] FAT-fs (loop1): Filesystem has been set read-only 06:03:14 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:14 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 581.555469][T23720] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 581.560996][T23625] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) 06:03:14 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 581.614416][T23720] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 581.670795][T23720] UDF-fs: Scanning with blocksize 1024 failed [ 581.717907][T23720] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:14 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) [ 581.774204][T23720] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 581.821538][T23720] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 581.866152][T23767] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 581.916817][T23720] UDF-fs: Scanning with blocksize 2048 failed [ 581.933663][T23720] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 581.936547][T23767] FAT-fs (loop3): Filesystem has been set read-only 06:03:15 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 581.974921][T23767] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 582.012517][T23720] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:15 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:15 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 582.087570][T23720] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 582.131606][T23720] UDF-fs: Scanning with blocksize 4096 failed 06:03:15 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) [ 582.177455][T23720] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 582.268708][T23765] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 582.366881][T23765] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:15 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 582.433638][T23765] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 582.493489][T23765] UDF-fs: Scanning with blocksize 512 failed [ 582.543559][T23765] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 582.622303][T23765] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 582.699610][T23765] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 582.749199][T23765] UDF-fs: Scanning with blocksize 1024 failed [ 582.804030][T23765] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 582.831845][T23765] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 582.844034][T23765] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 582.858842][T23765] UDF-fs: Scanning with blocksize 2048 failed [ 582.925123][T24019] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 582.938578][T24019] FAT-fs (loop3): Filesystem has been set read-only [ 582.940577][T23765] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 582.949077][T24019] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 582.969731][T23765] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:16 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:03:16 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:16 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:16 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:16 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socket$l2tp(0x18, 0x1, 0x1) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:16 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 582.997178][T23765] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 583.017783][T23765] UDF-fs: Scanning with blocksize 4096 failed [ 583.032108][T23765] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:16 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 583.269160][ T2489] print_req_error: 39 callbacks suppressed [ 583.269171][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 583.283078][ T2489] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 583.290645][T24156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 583.322384][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 583.329888][T24156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 583.497622][T24156] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 583.669602][T24156] UDF-fs: Scanning with blocksize 512 failed [ 583.682975][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 583.690708][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 583.698491][T24156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 583.742807][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 583.751850][T24156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 583.804466][T24156] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 583.840284][T24156] UDF-fs: Scanning with blocksize 1024 failed [ 583.873834][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 583.893374][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 583.900960][T24156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:16 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) [ 583.946947][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 583.958098][T24156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:17 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 583.999078][T24156] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 584.061200][T24156] UDF-fs: Scanning with blocksize 2048 failed 06:03:17 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 584.112249][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 584.125433][T24156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 584.155129][T24156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 584.193228][T24156] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 584.221325][T24156] UDF-fs: Scanning with blocksize 4096 failed 06:03:17 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 584.278486][T24156] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 584.341392][T24173] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 584.430772][T24173] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 584.493983][T24173] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 584.540989][T24173] UDF-fs: Scanning with blocksize 512 failed [ 584.606118][T24173] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 584.665444][T24173] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 584.729690][T24173] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:17 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 584.780154][T24173] UDF-fs: Scanning with blocksize 1024 failed [ 584.807212][T24173] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 584.836887][T24173] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 584.861323][T24173] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 584.905716][T24173] UDF-fs: Scanning with blocksize 2048 failed [ 584.943129][T24173] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 585.001897][T24173] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:18 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 585.055907][T24173] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:18 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:18 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 585.114398][T24173] UDF-fs: Scanning with blocksize 4096 failed [ 585.139479][T24173] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:18 executing program 4: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f6465762f6c6f6f70300044aaca0084868710cd3d12d8b5e10d608b378716cabfd84501c5fe24f241171e8fa0d94fd39f2329cf1374655a389e338c9b78bc63c6429c658c8ea9b335af477b8584c0d993c055db63bc2a19c85fb0a52d3e4f9830697bc76e8c33c3e8ae47ca74cb457ff9dbd7309792ad24111e81fbdf9a86e58fb20e136cc00066989bbb3caa81a381cb1c159cc85831703d9fc21bee4933c5f9028d02c2f8c41c9bade35e1869145c95d89239"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:18 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:18 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:03:18 executing program 4: chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000000)=ANY=[@ANYBLOB="bc2f646576006c6f6f703000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:18 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x5, 0x200000) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000180)=r1) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:19 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x141000) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:19 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710, 0x0, 0x0, 0x0}) 06:03:19 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) 06:03:19 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:19 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x0, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:19 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 586.284010][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 586.307534][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 586.320374][T24656] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 586.329432][T24656] UDF-fs: Scanning with blocksize 512 failed [ 586.465912][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:19 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) [ 586.527438][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 586.557753][T24656] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 586.633282][T24656] UDF-fs: Scanning with blocksize 1024 failed [ 586.718080][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 586.784274][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 586.811702][T24656] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 586.839964][T24656] UDF-fs: Scanning with blocksize 2048 failed [ 586.854371][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:19 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) [ 586.882641][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 586.916789][T24656] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 586.940234][T24656] UDF-fs: Scanning with blocksize 4096 failed [ 586.966147][T24656] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 587.088693][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 587.142306][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 587.193559][T24656] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 587.201285][T24656] UDF-fs: Scanning with blocksize 512 failed 06:03:20 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:20 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:20 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 587.302189][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 587.327384][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:20 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x0, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 587.382460][T24656] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 587.413333][T24656] UDF-fs: Scanning with blocksize 1024 failed [ 587.424110][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 587.463636][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 587.477719][T24656] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 587.488996][T24656] UDF-fs: Scanning with blocksize 2048 failed [ 587.570335][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 587.593186][T24656] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 587.690899][T24656] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 587.717432][T24656] UDF-fs: Scanning with blocksize 4096 failed [ 587.731972][T24656] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_pts(0xffffffffffffffff, 0x80) fsetxattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00', &(0x7f0000000100)=')]+$em1GPL-systemproc{systemvmnet1\x00', 0x23, 0x1) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f0000000180)='./file1\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/99, 0x63}, {&(0x7f0000000180)=""/23, 0x17}], 0x2, 0x3b) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) 06:03:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f64a0b4a71b63a2762f6e755875b60b981e80e066c7cee3c3ce34acee1eee047d71bee81a7efe2bb62ce96e12fa8ed9c5e19e9325ea7941f451dff2e4727020d2be"], &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000140)='udf\x00', 0x10008, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x101, 0x50040) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f0000000180)) 06:03:21 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x20000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x0, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:21 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:21 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 588.311595][ T2488] print_req_error: 38 callbacks suppressed [ 588.311608][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 588.330818][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 588.342105][T25034] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:21 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 588.433446][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 588.441146][T25034] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:21 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x0, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 588.498480][T25034] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 588.513864][T25034] UDF-fs: Scanning with blocksize 512 failed [ 588.578254][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 588.588402][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 588.597063][T25034] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 588.670999][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 588.696063][T25034] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 588.722532][T25034] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 588.773207][T25034] UDF-fs: Scanning with blocksize 1024 failed 06:03:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x3}) ioctl$SIOCX25GDTEFACILITIES(r0, 0x89ea, &(0x7f00000000c0)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000010b7705f0000000000ff0300"/32]) [ 588.850375][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 588.860648][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 588.882454][T25034] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:21 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 588.911562][ T2488] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 588.919693][T25034] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 588.984942][T25034] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 589.059820][T25034] UDF-fs: Scanning with blocksize 2048 failed [ 589.080190][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 589.110675][T25034] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:22 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 589.166185][T25034] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 589.201621][T25034] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 589.245783][T25034] UDF-fs: Scanning with blocksize 4096 failed [ 589.290094][T25034] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:22 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="af64001000008a04301bc60de66f700ba793515a9f5b178c87df6fdc6822ab041380fd3c2ff92d9738c8870e785db6df07660899977cf4e2ac97dca9fdfcf12d0c9556c5568f19ff3800000000892bad4684221bc441d56c4a1ce72311fdd95c8c33aad78d043a495198856b3e3fbc06e73197581f08ada4677b8bd7b2f56ef51a2eda7196a61e040f9374db3aa4c335cd47aa6d7a9fc8d18889e61b83886b878f57030884cebc8bd04208344b1e3b740ec61f70dede4ddda8d4010068c0ba0bc460bb10d372e1c649c7b531b6c8f5f3d3cb7c5e8276c1182c4e52d00d5d"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x17, 0x8000) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000180)=0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e24, @loopback}, 0x10) 06:03:22 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 589.667407][T25085] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 589.722199][T25085] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 589.788487][T25085] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 589.841841][T25085] UDF-fs: Scanning with blocksize 512 failed 06:03:22 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 589.921636][T25085] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 589.992433][T25085] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 590.079201][T25085] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 590.132094][T25085] UDF-fs: Scanning with blocksize 1024 failed 06:03:23 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) socket$xdp(0x2c, 0x3, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="ec01eea7d93c00000400705b0000000000000000000400"/32]) [ 590.184545][T25085] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 590.248435][T25085] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 590.265818][T25088] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) 06:03:23 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 590.306809][T25085] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 590.336415][T25085] UDF-fs: Scanning with blocksize 2048 failed [ 590.361186][T25088] FAT-fs (loop2): Filesystem has been set read-only [ 590.399173][T25085] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 590.414461][T25088] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 590.466720][T25085] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:23 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 590.526087][T25085] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 590.534438][T25085] UDF-fs: Scanning with blocksize 4096 failed [ 590.541108][T25085] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 590.565168][T25086] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 590.578407][T25086] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 590.616854][T25086] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 590.672396][T25086] UDF-fs: Scanning with blocksize 512 failed [ 590.732541][T25086] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 590.756940][T25096] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 06:03:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 590.791119][T25096] FAT-fs (loop3): Filesystem has been set read-only [ 590.808854][T25086] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 590.838716][T25096] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 590.850998][T25086] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:23 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 590.895924][T25086] UDF-fs: Scanning with blocksize 1024 failed [ 590.925938][T25086] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 590.978156][T25086] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 591.012898][T25086] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 591.037189][T25086] UDF-fs: Scanning with blocksize 2048 failed [ 591.070982][T25086] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:24 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 591.108485][T25086] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 591.126541][T25086] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 591.136912][T25086] UDF-fs: Scanning with blocksize 4096 failed [ 591.158970][T25086] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:24 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x400, 0x10) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000100)={0x101ff, 0x1, 0x3, 0x1000, &(0x7f0000fff000/0x1000)=nil}) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:24 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r0, r0, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x10, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user='access=user'}], [{@uid_gt={'uid>', r1}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '-@&vmnet1,'}}, {@uid_gt={'uid>', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@smackfshat={'smackfshat', 0x3d, 'memory.events\x00'}}]}}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000040), 0x12) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 591.462634][T25501] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:24 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x0, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:24 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 591.537063][T25501] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 591.551970][T25501] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 591.578715][T25501] UDF-fs: Scanning with blocksize 512 failed [ 591.632599][T25501] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 591.741561][T25501] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 591.824135][T25501] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:24 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000100)={0x7, 0x1b, 0x1}, 0x7) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000240)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) fcntl$addseals(r0, 0x409, 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000469fe7ff0010b7705f4a7d0500"/36]) 06:03:24 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 591.903769][T25501] UDF-fs: Scanning with blocksize 1024 failed [ 591.976189][T25501] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:25 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 592.051375][T25501] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 592.106567][T25501] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 592.169662][T25501] UDF-fs: Scanning with blocksize 2048 failed [ 592.229078][T25501] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:25 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 592.311991][T25501] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 592.373297][T25501] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 592.411851][T25501] UDF-fs: Scanning with blocksize 4096 failed [ 592.418161][T25501] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:25 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file1\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:25 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 592.647137][T25899] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 592.684982][T25899] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:25 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 592.696588][T25899] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 592.718972][T25899] UDF-fs: Scanning with blocksize 512 failed [ 592.811780][T25899] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:25 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000100)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)={0x0, 0x5f70b710, 0x0, 0x0, 0x49249249249273c}) [ 592.867787][T25899] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 592.884314][T25899] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 592.905897][T25899] UDF-fs: Scanning with blocksize 1024 failed [ 592.947779][T25899] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 593.032269][T25899] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:26 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:26 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 593.072842][T25899] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 593.099617][T25899] UDF-fs: Scanning with blocksize 2048 failed [ 593.206407][T25899] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 593.284944][T25899] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 593.300615][T25899] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 593.308590][T25899] UDF-fs: Scanning with blocksize 4096 failed [ 593.322265][T25899] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 593.357752][ T2488] print_req_error: 50 callbacks suppressed [ 593.357764][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 593.376951][T25907] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 593.402854][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 593.410205][T25907] FAT-fs (loop2): Filesystem has been set read-only [ 593.416171][T25907] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 593.417444][T26036] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 593.447879][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 06:03:26 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 593.457754][T26036] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 593.478753][T26036] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 593.550892][T26036] UDF-fs: Scanning with blocksize 512 failed [ 593.584965][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 06:03:26 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 593.593994][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 593.602830][T26036] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 593.630697][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 593.638443][T26036] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:26 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 593.664980][T26036] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 593.681998][T26036] UDF-fs: Scanning with blocksize 1024 failed [ 593.702288][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 593.710058][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 593.717856][T26036] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 593.759343][ T2488] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 593.768346][T26036] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 593.771642][T26139] FAT-fs (loop5): bogus number of reserved sectors [ 593.790949][T26036] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 593.821995][T26139] FAT-fs (loop5): Can't find a valid FAT filesystem [ 593.845710][T26036] UDF-fs: Scanning with blocksize 2048 failed [ 593.883199][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 593.900133][T26036] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 593.920946][T26036] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 593.971021][T26036] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 594.032873][T26036] UDF-fs: Scanning with blocksize 4096 failed 06:03:27 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) getpeername$inet(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000000000010fb065f000000000000000000000000000000000000001be86f48a3454eda6be1a3daadda7b2bdc2092d6599136135aa9ccf1fc9c14fa67a6a516bc49934739f772007d3f3132c491dc6c1b19337bf88de4d2307e38830c07cce3a62bff54db41d61adf173c57d7d6a6d000ba8ac0bcd3c20b3a2e6128a0b355a22870f720e348d29cec7826b8611d2cf606e8e5b02dcc264ef25484fd46a77fd3582af62fcf9523f16ad8d54f82f1d765bc4e806ee8c55ebcb63beb23e7802fad2a76548c55977ded5e796327e9e8c92a232caa1c"]) 06:03:27 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 594.086382][T26036] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:27 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000500)={@local, @multicast1, 0x0}, &(0x7f0000000540)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000580)={@loopback, 0x4d, r1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000180)=""/95) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) msgget(0x3, 0x8) 06:03:27 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 594.217886][T26253] FAT-fs (loop5): bogus number of reserved sectors [ 594.254089][T26253] FAT-fs (loop5): Can't find a valid FAT filesystem 06:03:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0xfffffffffffffffd, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x87, 0x7, 0xfc4, "66a1431a36bd9373fd70018a6f997b25", "a2c67ab4acd5741d28243b9f23302a7770eba8eea0f7c918357c1e0b3bfda213df61031e2192775fa78d7692ed3ddb0c8619f28fd42992196a31387ae7cb57a8b8b982a63279704dba9060e298e9aae69b7622ffd01e2da786f93f8e5444d0fade4c194a6eba99a1cfeec8de5a7573055949"}, 0x87, 0x1) 06:03:27 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:27 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 594.467199][T26151] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 594.542233][T26151] FAT-fs (loop2): Filesystem has been set read-only 06:03:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000300)=ANY=[@ANYRESHEX], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 594.602221][T26377] FAT-fs (loop5): bogus number of reserved sectors [ 594.608851][T26377] FAT-fs (loop5): Can't find a valid FAT filesystem [ 594.609727][T26151] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:03:27 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x0, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:27 executing program 4: mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 594.909986][T26301] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) 06:03:27 executing program 4: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) prctl$PR_GET_TSC(0x19, &(0x7f00000001c0)) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) getpeername(r0, &(0x7f00000002c0)=@tipc=@id, &(0x7f0000002400)=0x80) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000380)={0x0, 0x0, 0x2080}) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x3) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) 06:03:28 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 594.981118][T26301] FAT-fs (loop3): Filesystem has been set read-only [ 595.037120][T26301] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 595.105829][T26499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 595.144574][T26503] FAT-fs (loop5): bogus number of reserved sectors [ 595.181217][T26503] FAT-fs (loop5): Can't find a valid FAT filesystem [ 595.185993][T26499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:28 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x400}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@default, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default]}, 0x48) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00%S.\x00K2\bQ!\x00\x00\x00\x00\x00']) 06:03:28 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 595.226038][T26499] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 595.283863][T26499] UDF-fs: Scanning with blocksize 512 failed [ 595.387158][T26499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:28 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 595.512504][T26499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 595.595493][T26619] FAT-fs (loop5): bogus number of reserved sectors [ 595.612292][T26499] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 595.637184][T26619] FAT-fs (loop5): Can't find a valid FAT filesystem [ 595.639658][T26499] UDF-fs: Scanning with blocksize 1024 failed 06:03:28 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 595.685365][T26499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 595.711791][T26499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 595.721394][T26499] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:28 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 595.814387][T26499] UDF-fs: Scanning with blocksize 2048 failed [ 595.834884][T26499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 595.927336][T26499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 595.951710][T26499] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 595.984582][T26740] FAT-fs (loop5): bogus number of reserved sectors [ 595.991539][T26740] FAT-fs (loop5): Can't find a valid FAT filesystem [ 595.998830][T26499] UDF-fs: Scanning with blocksize 4096 failed [ 596.009978][T26499] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 596.054173][T26507] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 596.113698][T26507] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:29 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:29 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 596.172892][T26507] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 596.210935][T26507] UDF-fs: Scanning with blocksize 512 failed [ 596.267505][T26507] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 596.282186][T26507] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 596.329994][T26846] FAT-fs (loop5): bogus number of reserved sectors [ 596.379772][T26507] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 596.387980][T26846] FAT-fs (loop5): Can't find a valid FAT filesystem 06:03:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000380)=ANY=[@ANYBLOB="09000080c819fdde8000000002090000000074"]) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0x104, r1, 0x810, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0xb}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xfff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xec25}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80000000}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3ff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x20004800}, 0x4008004) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000010b7705f00000000000000c2cf1fc071000000816e090000"]) [ 596.477926][T26507] UDF-fs: Scanning with blocksize 1024 failed [ 596.498929][T26507] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 596.556219][T26507] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 596.621899][T26507] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 596.668338][T26507] UDF-fs: Scanning with blocksize 2048 failed [ 596.689178][T26507] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 596.749382][T26507] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 596.786541][T26507] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 596.803714][T26507] UDF-fs: Scanning with blocksize 4096 failed [ 596.838203][T26507] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="bd5161ca8a4439"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:29 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:29 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 596.926037][T26876] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 596.985799][T26876] FAT-fs (loop3): Filesystem has been set read-only [ 597.004898][T26971] FAT-fs (loop5): bogus number of reserved sectors [ 597.037526][T26876] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 597.072310][T26971] FAT-fs (loop5): Can't find a valid FAT filesystem 06:03:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr\x00') write$P9_RREADDIR(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2a00001f2901008a8700000202000000010000000000000066e156020000000000000207002e2f66696c653005649e545c33dd952a04b7eac7751109b5c7af5776e9161028c40fbbec36b552ff2e1fb7a7a0f3cdceba4f36a64873b19cb84d7561786484c5824774d9bb"], 0x2a) 06:03:30 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x0, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 597.273728][T27013] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 597.320757][T27013] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 597.378651][T26961] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 597.383001][T27013] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 597.391711][T26961] FAT-fs (loop1): Filesystem has been set read-only 06:03:30 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 597.438455][T26961] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 597.488532][T27013] UDF-fs: Scanning with blocksize 512 failed [ 597.527880][T27013] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 597.591245][T26973] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 597.602234][T27013] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 597.618400][T26973] FAT-fs (loop2): Filesystem has been set read-only [ 597.626172][T27013] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0xffffffffffffffe0}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 597.646607][T27094] FAT-fs (loop5): bogus number of reserved sectors [ 597.646636][T26973] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 597.670870][T27013] UDF-fs: Scanning with blocksize 1024 failed [ 597.677431][T27094] FAT-fs (loop5): Can't find a valid FAT filesystem [ 597.718443][T27013] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:30 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 597.815897][T27013] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:30 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 597.863757][T27062] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 597.878711][T27013] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 597.947192][T27013] UDF-fs: Scanning with blocksize 2048 failed [ 597.950571][T27062] FAT-fs (loop3): Filesystem has been set read-only [ 597.985696][T27013] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 597.993529][T27062] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 598.018952][T27013] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 598.051037][T27212] FAT-fs (loop5): bogus number of reserved sectors [ 598.067441][T27013] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 598.077581][T27212] FAT-fs (loop5): Can't find a valid FAT filesystem [ 598.085858][T27013] UDF-fs: Scanning with blocksize 4096 failed [ 598.092908][T27013] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 598.103836][T27037] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:31 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x0, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 598.145423][T27037] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 598.186600][T27037] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 598.203014][T27037] UDF-fs: Scanning with blocksize 512 failed [ 598.210208][T27037] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 598.222001][T27037] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 598.232045][T27037] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 598.240016][T27037] UDF-fs: Scanning with blocksize 1024 failed [ 598.247143][T27037] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 598.257533][T27037] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 598.299017][T27037] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 598.348325][T27037] UDF-fs: Scanning with blocksize 2048 failed [ 598.350038][T27166] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 598.375337][ T2489] print_req_error: 47 callbacks suppressed [ 598.375349][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 598.381321][T27166] FAT-fs (loop1): Filesystem has been set read-only 06:03:31 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 598.390205][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 598.391199][T27037] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 598.460344][T27166] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 598.480468][ T2489] print_req_error: I/O error, dev loop4, sector 4096 flags 0 [ 598.490288][T27037] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 598.534170][T27037] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 598.587084][T27037] UDF-fs: Scanning with blocksize 4096 failed [ 598.592411][T27329] FAT-fs (loop5): bogus number of reserved sectors [ 598.606997][T27329] FAT-fs (loop5): Can't find a valid FAT filesystem [ 598.623511][T27037] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:31 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2fad000000000000000000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) setgid(r0) 06:03:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x86080, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) 06:03:31 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:31 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='udf\x00', 0x0, 0x0) [ 598.983892][T27447] FAT-fs (loop5): bogus number of reserved sectors [ 599.041992][T27447] FAT-fs (loop5): Can't find a valid FAT filesystem [ 599.143588][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 599.151530][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 599.159544][T27514] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 599.212001][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 599.219664][T27514] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 599.255581][T27514] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 599.289676][T27514] UDF-fs: Scanning with blocksize 512 failed 06:03:32 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x0, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:32 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 599.317229][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 599.326165][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 599.339042][T27514] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 599.365176][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 599.397092][T27514] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 599.457252][T27514] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 599.458549][T27567] FAT-fs (loop5): bogus number of reserved sectors [ 599.508034][T27514] UDF-fs: Scanning with blocksize 1024 failed [ 599.553054][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 599.572954][T27567] FAT-fs (loop5): Can't find a valid FAT filesystem [ 599.573674][T27514] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:32 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 599.643157][T27513] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 599.646182][T27514] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 599.665666][T27513] FAT-fs (loop2): Filesystem has been set read-only [ 599.708906][T27513] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:03:32 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 599.792598][T27514] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 599.830865][T27514] UDF-fs: Scanning with blocksize 2048 failed 06:03:32 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 599.887606][T27514] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 599.954787][T27514] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 600.038545][T27684] FAT-fs (loop5): bogus number of reserved sectors [ 600.061965][T27514] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 600.069696][T27514] UDF-fs: Scanning with blocksize 4096 failed [ 600.084679][T27684] FAT-fs (loop5): Can't find a valid FAT filesystem 06:03:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0xc9) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 600.151773][T27514] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:33 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:33 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:33 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 600.463571][T27804] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 600.473443][T27803] FAT-fs (loop5): bogus number of reserved sectors [ 600.497419][T27803] FAT-fs (loop5): Can't find a valid FAT filesystem [ 600.528350][T27804] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:33 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000180)=0x5000) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x1e, 0x3, 0x80000) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0, 0x21e}, 0x0) dup3(r1, r2, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000010b7705f00000000e8ffffff00000000ec020000000000007313710649b9c4e6299a986a963e3359323ba9dd3587df0a4f438eab7b920d5712a8b365acd1dfcfbf248088c38005057eb3a54462a3298360cbcef46b02cc2b2d23be3420"]) [ 600.577895][T27804] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:33 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 600.662706][T27804] UDF-fs: Scanning with blocksize 512 failed [ 600.663362][T27723] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) 06:03:33 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 600.716328][T27804] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 600.722334][T27723] FAT-fs (loop2): Filesystem has been set read-only [ 600.751833][T27804] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 600.791227][T27723] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 600.812240][T27804] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:33 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 600.860188][T27804] UDF-fs: Scanning with blocksize 1024 failed [ 600.902464][T27804] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 600.948174][T27804] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 600.955691][T27929] FAT-fs (loop5): bogus number of reserved sectors [ 600.961389][T27804] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 601.023475][T27929] FAT-fs (loop5): Can't find a valid FAT filesystem [ 601.049059][T27804] UDF-fs: Scanning with blocksize 2048 failed [ 601.133318][T27804] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 601.160435][T27804] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:34 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 601.234174][T27804] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 601.283832][T27804] UDF-fs: Scanning with blocksize 4096 failed [ 601.361929][T27804] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 601.385842][T28044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 601.404243][T28046] FAT-fs (loop5): bogus number of reserved sectors [ 601.419443][T28044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 601.432130][T28046] FAT-fs (loop5): Can't find a valid FAT filesystem 06:03:34 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 601.480418][T28044] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 601.514801][T28044] UDF-fs: Scanning with blocksize 512 failed [ 601.535630][T28044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:34 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 601.589855][T28044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:34 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 601.647606][T28044] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:34 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x40000, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 601.691198][T28044] UDF-fs: Scanning with blocksize 1024 failed [ 601.756626][T28044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 601.849814][T28044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 601.864981][T28167] FAT-fs (loop5): bogus number of reserved sectors [ 601.901656][T28044] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:34 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 601.951612][T28044] UDF-fs: Scanning with blocksize 2048 failed [ 601.970322][T28044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 601.992731][T28167] FAT-fs (loop5): Can't find a valid FAT filesystem [ 602.017625][T28044] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 602.036588][T28044] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 602.070522][T28044] UDF-fs: Scanning with blocksize 4096 failed [ 602.108450][T28044] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:35 executing program 4: mount(&(0x7f0000000000)=ANY=[@ANYBLOB="0800000000000000703000e0475f3ff748debd1a163bc8b031f75d51c24929268390d92080d8b1c8d7ba78d53d73b309724c03f41770f6ad261afcb4a503bc0a5fc3ee316037c797b58dd41c35ca5e69173a5d6d63f23d45065971c8914bc404b485000000000000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:35 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 602.389630][T28288] FAT-fs (loop5): invalid media value (0x00) 06:03:35 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@initdev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x80000, &(0x7f0000000380)={[{@mode={'mode', 0x3d, 0x988}}, {@mode={'mode', 0x3d, 0x539}}, {@mode={'mode', 0x3d, 0x9}}], [{@context={'context', 0x3d, 'staff_u'}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@subj_role={'subj_role', 0x3d, '-em0procppp1'}}, {@uid_gt={'uid>', r1}}, {@context={'context', 0x3d, 'user_u'}}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 602.447723][T28288] FAT-fs (loop5): Can't find a valid FAT filesystem 06:03:35 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:35 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:35 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40000, 0x40) 06:03:35 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 602.770592][T28410] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 602.797812][T28407] FAT-fs (loop5): invalid media value (0x00) [ 602.858579][T28407] FAT-fs (loop5): Can't find a valid FAT filesystem [ 602.876170][T28410] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 602.933717][T28410] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:36 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000005c946eae10b7705f0000000000003820df044dce599aef1300"/41]) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000100)={0x3f, 0x8, 0x0, 0x81, 0x5, 0x6, 0x52, 0x323, 0x3, 0x1}) 06:03:36 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 602.989377][T28410] UDF-fs: Scanning with blocksize 512 failed [ 603.019133][T28410] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:36 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 603.077655][T28410] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 603.108226][T28410] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 603.164199][T28410] UDF-fs: Scanning with blocksize 1024 failed [ 603.205070][T28410] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 603.245019][T28526] FAT-fs (loop5): invalid media value (0x00) [ 603.267470][T28410] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 603.283156][T28526] FAT-fs (loop5): Can't find a valid FAT filesystem [ 603.329130][T28410] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 603.373349][T28410] UDF-fs: Scanning with blocksize 2048 failed [ 603.414755][ T2489] print_req_error: 38 callbacks suppressed [ 603.414768][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 603.432609][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 603.441806][T28410] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:36 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:36 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:36 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 603.510091][ T2489] print_req_error: I/O error, dev loop4, sector 4096 flags 0 [ 603.519183][T28410] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 603.558716][T28410] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 603.572825][T28410] UDF-fs: Scanning with blocksize 4096 failed [ 603.579038][T28410] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:36 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x2) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 603.701994][T28645] FAT-fs (loop5): invalid media value (0x00) [ 603.753448][T28645] FAT-fs (loop5): Can't find a valid FAT filesystem [ 603.797790][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 603.806245][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 603.814490][T28705] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 603.931819][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 603.939358][T28705] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:37 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:37 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 603.994094][T28705] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 604.069161][T28705] UDF-fs: Scanning with blocksize 512 failed [ 604.111911][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 604.121765][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 604.129186][T28705] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 604.156856][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 604.170069][T28705] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:37 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 604.209473][T28705] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 604.217987][T28705] UDF-fs: Scanning with blocksize 1024 failed [ 604.230717][T28765] FAT-fs (loop5): invalid media value (0x00) [ 604.237603][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 604.251856][T28705] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 604.288306][T28765] FAT-fs (loop5): Can't find a valid FAT filesystem [ 604.296439][T28705] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 604.372919][T28705] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 604.423734][T28705] UDF-fs: Scanning with blocksize 2048 failed 06:03:37 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 604.475390][T28705] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:37 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 604.532056][T28705] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:37 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 604.604975][T28705] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 604.615006][T28705] UDF-fs: Scanning with blocksize 4096 failed [ 604.621214][T28705] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 604.669864][T28879] FAT-fs (loop1): bogus number of reserved sectors [ 604.684107][T28881] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 604.710973][T28889] FAT-fs (loop5): invalid media value (0x00) [ 604.765585][T28889] FAT-fs (loop5): Can't find a valid FAT filesystem [ 604.769440][T28879] FAT-fs (loop1): Can't find a valid FAT filesystem [ 604.778527][T28881] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 604.790368][T28881] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 604.832630][T28881] UDF-fs: Scanning with blocksize 512 failed [ 604.869183][T28881] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 604.938961][T28881] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:38 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 604.992823][T28881] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:38 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 605.052878][T28881] UDF-fs: Scanning with blocksize 1024 failed [ 605.085176][T28881] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 605.126586][T28881] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 605.133835][T29002] FAT-fs (loop5): invalid media value (0x00) [ 605.156171][T28881] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 605.166694][T29002] FAT-fs (loop5): Can't find a valid FAT filesystem [ 605.169140][T28881] UDF-fs: Scanning with blocksize 2048 failed [ 605.186545][T28881] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 605.239397][T28881] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 605.278986][T28881] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 605.329574][T28881] UDF-fs: Scanning with blocksize 4096 failed [ 605.342951][T28881] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:38 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:38 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYBLOB="0000000000000000000000000019000000"], &(0x7f0000000180)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 605.536975][T29116] FAT-fs (loop5): invalid media value (0x00) [ 605.566595][T29116] FAT-fs (loop5): Can't find a valid FAT filesystem 06:03:38 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x40, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) 06:03:38 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 605.589104][T29123] FAT-fs (loop1): bogus number of reserved sectors [ 605.608182][T29126] e Filesystem requires source device [ 605.621836][T29123] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:38 executing program 4: syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0xa, &(0x7f00000007c0)=[{&(0x7f0000000180)="4471b9cab582af1b4751c2cf942b8d0330eec805776eb45561f33594ebdce3cf304ba1f191a239323f569d93a6c2ad2ddc29dbdb7ef82275330d276f43661dc05e0dfb26dcffd3e33591ecbf40a78f8821299152f52e9e2b888b5a74a5e646849e4eb33f5ab8db67cf83c05abaa2e3d94e428fd6d133d50365ecc50b8370fd8726de815d7bc2acd02df7da4eef4fc8da1c2aa11259d0c522510833a7099238778f38dd76865f0a3915467d6634ff8408a5d5a27675f2537835526c75bef25a03f34941929b53", 0xc6, 0x60}, {&(0x7f0000000280)="a16e539578f03795bc6772c614ab9d35aafe4314ddcdfaacf3b6721553e08b810404130660b13d62b76b5b45ca9603801dba18b73dc2a90d2aa95192617d942c3d134866d0caea7f958172c2b87cbb4689b7d6f28510d631a286c22bfd2ba06ab8eb66905e3d9b5b091bdf20fcfcbefc0a9b3f1c18218552933ec459eb73f7ec2544f4e8ede6558a57142cee3d8289d1b50cb10372c0bdd68c20a42effe4c3f133b9a3d8f7aaf91d1dfa74558516968a5d6ab5353e75a5989479988fb0782512a99da92f41afb3915baf9a3ac57e0a138c6509817b54517bbc52c1f62e26171f7d7407e33fdb03187dd0abf0655dd897", 0xf0, 0x4}, {&(0x7f0000000380)="64726f8685a6ccfda587e897778eddf31c1256dec5de1f29d8ce1ef7649288002da18804aa7377675d0cdc421a9ac604cb5ad511aec2a0dc912d705000ffad54075b0409fdbc092fdabf10f3e9feff147901af8f7c05b68b06139753dafe37012c12346190f8e6b16986e445566e8dea16cd435a82178213b8c2174c90ed7995c7be0608b90966dfb065a15729145e74742b5162ce3a0e3fbe3097fdbe9e709571d1a9d6fb83680f8d02a4d5b77ae174123780563819dcc892227f5a956999e42c5c739807fb48c4c466874591b437971bcba1a007d21796e6", 0xd9, 0x8}, {&(0x7f0000000480)="96c6ec9b597a6c0d9334b6f65c77aaf27c0348ac369c156c9cbecc28473ef7b76ae8019105ab0741b1e5b6292359507bddc95e35910916c985cb656af4f25189c34909302cb52ee703f4f8c00abe624d227faabbacb406b0deec44bab9a0f9d03de0a05377e3c124e5360312c776f201cc3dad717ebcae6333cd08518585529f558b", 0x82, 0x5}, {&(0x7f0000000540)="75662dcccb35ccbe9384fb753c951c5b67c9f822246939ddcd3f59ae63a30318bcd61dad412bdb4d331a4cd2", 0x2c, 0x1}, {&(0x7f0000000580)="94ebbd6c9e1d7ce4c44bce3b7cd179fece8988f02bf2436b8f783faf9945d9975ac751131799f9ab5364ba46807e8810b9d205f4ed473c949404b944cf60a6a35eb339892b5a8ffa8c7bca03bc2a659f86b562cbdaabf3dbd9", 0x59, 0xe4}, {&(0x7f0000000600)="34807f9ca876ab1b5f06a05562a51ff13814d4655c56171c42929e1c", 0x1c, 0x9}, {&(0x7f0000000640)="5662ede50a2e2873227495aba3a6e3", 0xf, 0x54f4}, {&(0x7f0000000680)="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", 0xfe, 0x3}, {&(0x7f0000000780)="aad10f3dbe62b953762a5f5af1e7518ce15322773dfe3f68e3fa7b3b66f14c0efa4fa0913cc0166d3e4ea8a7e481e72d20d271553c2e143e1f50855a72", 0x3d, 0x1}], 0x1000000, &(0x7f00000008c0)={[{@user_xattr='user_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@nouser_xattr='nouser_xattr'}, {@user_xattr='user_xattr'}, {@acl='acl'}, {@user_xattr='user_xattr'}]}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000a40)='udf\x00', 0x42, 0x0) r0 = accept$ax25(0xffffffffffffffff, &(0x7f0000000900)={{0x3, @bcast}, [@default, @remote, @rose, @netrom, @bcast, @bcast, @rose]}, &(0x7f0000000980)=0x48) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f00000009c0)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}) 06:03:38 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 605.874352][T29239] erofs: read_super, device -> /dev/loop4 [ 605.950968][T29239] erofs: options -> user_xattr,noacl,acl,nouser_xattr,user_xattr,acl,user_xattr, [ 606.030435][T29248] FAT-fs (loop5): invalid media value (0x00) [ 606.050213][T29239] erofs: cannot find valid erofs superblock [ 606.067948][T29248] FAT-fs (loop5): Can't find a valid FAT filesystem 06:03:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0xb71, 0x3f, 0x200, 0x7b3, 0x100000000, 0x2}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 606.175481][T29239] erofs: read_super, device -> /dev/loop4 06:03:39 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 606.221879][T29239] erofs: options -> user_xattr,noacl,acl,nouser_xattr,user_xattr,acl,user_xattr, [ 606.269467][T29239] erofs: cannot find valid erofs superblock 06:03:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x2, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x4) 06:03:39 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:39 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 606.533718][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 606.595930][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 606.606012][T29374] FAT-fs (loop1): bogus number of reserved sectors 06:03:39 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x0, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 606.678907][T29372] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 606.716532][T29374] FAT-fs (loop1): Can't find a valid FAT filesystem [ 606.725055][T29372] UDF-fs: Scanning with blocksize 512 failed [ 606.761872][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 606.821252][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 606.871584][T29372] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 606.900451][T29372] UDF-fs: Scanning with blocksize 1024 failed [ 606.939150][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 607.005231][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 607.051845][T29372] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 607.062971][T29372] UDF-fs: Scanning with blocksize 2048 failed [ 607.093871][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 607.110965][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x0, 0xfffffffffffffffc, 0x80000, 0x1}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, r0, 0x0, 0xe, &(0x7f0000000100)='memory.events\x00', 0xffffffffffffffff}, 0x30) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)=0x0) kcmp(r1, r3, 0x5, r0, r2) write$P9_RWSTAT(r0, &(0x7f0000000200)={0x7, 0x7f, 0x2}, 0x7) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00b3bd4cbdd38c941b61963e0000ff7f000000005a0ac360ccfe9b85d05a070000000011c4705f00000000"]) [ 607.167799][T29372] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 607.195588][T29372] UDF-fs: Scanning with blocksize 4096 failed [ 607.202395][T29372] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:40 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 607.272994][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 607.308705][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:40 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 607.392716][T29372] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:40 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 607.486860][T29372] UDF-fs: Scanning with blocksize 512 failed [ 607.503098][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 607.521383][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 607.533967][T29372] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 607.550435][T29372] UDF-fs: Scanning with blocksize 1024 failed [ 607.560335][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 607.576641][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 607.602963][T29402] FAT-fs (loop1): bogus number of reserved sectors 06:03:40 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) connect$netlink(r0, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x94101020}, 0xc) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x3) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000040)) [ 607.661866][T29372] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 607.701946][T29402] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:40 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x0, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 607.717630][T29372] UDF-fs: Scanning with blocksize 2048 failed [ 607.750065][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 607.820197][T29372] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 607.849680][T29372] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 607.857910][T29372] UDF-fs: Scanning with blocksize 4096 failed 06:03:40 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 607.913618][T29372] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="30000000000000957200007528c6cc326182a903d5375aae52f6adc6e776c6e0ef12679ef185d61affcf66865ea8e0b2aa46454bce6371b02f6ac913adc3abaedc92690ba4af679ec9c0e1da295b7444ab83e58a015d3ffeca41f903b800e89dade81ac3a17cf35de4c9762567d0288ac9ce929d05dfbe469f9a2d9f06217457a6b7ad7f52b48ada3a1040e36af68382c0575f6b57886193e531fd1915d1b09cffd34259"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x800) accept$unix(r0, &(0x7f0000000240)=@abs, &(0x7f0000000080)=0x6e) [ 608.165373][T29394] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 608.234658][T29394] FAT-fs (loop2): Filesystem has been set read-only [ 608.270571][T29394] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:03:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x10402, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0x9}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x50000, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000240)={r1, 0x80000, r2}) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x3}) [ 608.279838][T29525] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 0) 06:03:41 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:41 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x0, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:41 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 608.376018][T29521] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 608.411834][T29525] FAT-fs (loop3): Filesystem has been set read-only [ 608.436051][T29521] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 06:03:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20000, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000000580)=[{&(0x7f0000000180)={0x27, 0x0, 0x2, 0x7, 0x6, 0x9, "538891482602614a05b718ed3e03d42e6d1bbdbed8fa3cc82c9d31e061b8fba37a8c4c754e201f6e807d0988ded831a2e01da01236b16823083844d754836b", 0x26}, 0x60, &(0x7f0000000440)=[{&(0x7f0000000200)="20cf1b6b5a5675902dfe6e3dae540303786971bbf8168d864bdaec07dbaf70fe1fa77aec80540080f0b21cd7871e2456bfa3bfdabe35fbad7a677ce1da302626e1ff869af8ea57177ec5510ffcde463699571632027f41fb74584b95a64d29cb86a20f89550a1bcd2b7b5475", 0x6c}, {&(0x7f0000000100)="a2d19fdec40a5516e4c3065b2e0b22e8da785a92269a3e5438cd28b120669550e5b8e94968e1ac62440540b51206e23050cc2b", 0x33}, {&(0x7f0000000280)="033f7749364c147dcb13116f2115e8abf11e8323da8d712182ce81c37030e4c64e1b175925780f9e74d8a8225fb7750dd4f54eedb8b0b52255abe6e02ffa1de9266e2d4976e96b29f5a6cf541039b34ce4f3d86de4045fd0ce1fba9d35737df3ab1b8b2cfce43961a072b04cd27961b0a624d901de2ed907c101c7af2645042404bb3deee9a3ade8b5d9cb736453fdd20b565dc0ef7d5ed08bd6243e5c50a8f481d778a1d74c46570098f64e6cc9552d96ef37d5c464ec3c9be5", 0xba}, {&(0x7f0000000340)="fecddf82d1f5864e935bd58ab8204f086266e8c061a32ebf618573bb8804526d9eb106635853014aefa504a522953f9b157e3e49d91f0ea1bd9e1a8d34585a59ae08936fe16ce7f3018154a44801ee0043a7fe48106a4665658c5ae3e5f7139c91a936dc2cb6d3da5b8db70d180f12a427fa9b7b3bd5d5140880a51c188deb356e87662c6f00682b70838911b1f1ed1c15451caebaf51b7a070b4be5a23ce3ce3c84b0ccbd1824ece6535b084a0990b8eac70585f3428d8d46e9f07a8db1b42001e77d6e64fdd43da75b7638a2637faac9c0917179095d0d57242bf23db8a3a507341b731e8c0f2812859614622ba8aa", 0xf0}], 0x4, &(0x7f0000000480)={0xd8, 0x3a, 0xb100000, "6ad724aba3261d3644021240409f5dd01cacf7e46d091dd073556e0b4688d8c8caf5e3bbe84152564b96e8a4981147a712475ce70211d2ba7d2bc9d52bcb0495c6360d69956158e55fb1ba7d60c4ceb0708bb188d46b56c53388a7ce7d70cfa3fd8a99b119153ce59adb08fe8d85b697f2609bfe4dc1efbc2f0967b09fe89069a5cac139efb408fd87356e16f601d176359e4f34c87174401e3e7765ba617d1cb814cf485b26042c678e85d75ef7125df8b6e875cf50e0f3b25d08d52a8a0e7ac19cb015209c"}, 0xd8, 0x40000}], 0x1, 0x80) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:41 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x0, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 608.573769][T29668] FAT-fs (loop1): bogus number of reserved sectors [ 608.615339][ T2488] print_req_error: 41 callbacks suppressed [ 608.615351][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 608.642840][T29668] FAT-fs (loop1): Can't find a valid FAT filesystem [ 608.667868][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 608.675476][T29699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 608.707960][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 06:03:41 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 608.727070][T29699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 608.764732][T29699] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:41 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000240)=""/151, 0x1004000, 0x1800}, 0x18) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 608.778789][T29699] UDF-fs: Scanning with blocksize 512 failed [ 608.811675][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 608.867207][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 608.877096][T29699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 608.921887][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 608.929771][T29699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 608.972596][T29699] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 609.076015][T29699] UDF-fs: Scanning with blocksize 1024 failed [ 609.108335][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 06:03:42 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 609.139243][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 609.161350][T29699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 609.246387][ T2488] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 609.261677][T29699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 609.306628][T29699] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:42 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x0, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:42 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 609.361384][T29699] UDF-fs: Scanning with blocksize 2048 failed [ 609.437300][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 609.450474][T29699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 609.480788][T29699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 609.544981][T29699] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 609.567283][T29699] UDF-fs: Scanning with blocksize 4096 failed [ 609.587207][T29888] FAT-fs (loop1): bogus number of reserved sectors 06:03:42 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 609.601361][T29699] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 609.671631][T29888] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) migrate_pages(r0, 0x5, &(0x7f0000000040)=0x7f, &(0x7f0000000100)=0x6) [ 609.940472][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 609.950793][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 609.961943][T29908] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 609.969879][T29908] UDF-fs: Scanning with blocksize 512 failed [ 609.978190][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 610.013663][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:43 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000000c0)={0x401, 0x3f, 0xe000000000000000, 0x81}, 0x10) r1 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000240)="a1fda7b9f777db696da55573ec67adad6ee0579cf4102089de73536783580d8c77f8362e766c5c549dbb397cce06afa390b404f3d9eb01c2fa04498941591e29a8d5941fc4616211135a0e1204d3540749451a867736394f9c27182201f4d1746c85a714c3deacc68279e1d6770e4e0c9cbab964df4f70fd65", 0x79, 0xfffffffffffffffc) r2 = request_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='}.\x00', 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f00000001c0)='id_legacy\x00', &(0x7f00000002c0)={'syz', 0x3}, r2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000440)=ANY=[@ANYBLOB="004000000000000010b7705f000000000000000000000000000000000000000001242e4ef9aef9233881aded22167c656c1d98b60a98658b01f8ffff6edb1b84e3486ba33595545c7320ff0d8da2ce81"]) keyctl$search(0xa, r1, &(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x1}, r2) [ 610.058006][T29908] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 610.079438][T29908] UDF-fs: Scanning with blocksize 1024 failed [ 610.155790][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 610.204153][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:43 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 610.295393][T29908] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 610.344060][T29908] UDF-fs: Scanning with blocksize 2048 failed [ 610.354499][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 610.382335][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:43 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x0, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:43 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 610.439142][T29908] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 610.460633][T29908] UDF-fs: Scanning with blocksize 4096 failed [ 610.470217][T29908] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 610.579859][T29956] FAT-fs (loop1): bogus number of reserved sectors 06:03:43 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:43 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 610.650185][T29956] FAT-fs (loop1): Can't find a valid FAT filesystem [ 610.934340][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 611.071632][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 611.151639][T29908] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:44 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 611.229163][T29908] UDF-fs: Scanning with blocksize 512 failed [ 611.316915][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 611.373242][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:44 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:44 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory\x1beven|s\x02\x00\x00\x00\xee\x94\xd9\xba\xd1@rd)_;\xa8P%\x06\x00\x00\x00\x00\x00\x00\x00\xc4\x18\'\xcd\x1f\"D\x96\xe2\x11\x83\x8f\xc6\x81dt\xeb\x94Ji3\"\xd0\x8b0f\f\xca?\x11LQd\x14\x94\xd0F/\x05\x88\xb1\x8e%\x90-\x97\xd3\xc5\x1ax\xadK\xc3\xf3\xfbT\x04I\xf8\f\x97\xd6N\xef\xb0\x94\xc4\xf6\x1d\x87.\x86\x8b\xf2\x14}\xa9\x84\xdb}\f&\x85\x04\xa2\xa9\x1a\xeag~\xf4m\xb7#\xea\xb2\xec\xdcsYO\x93\xf3\xea6m', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0xffffffffffffffff, r0, 0x0, 0xe, &(0x7f00000000c0)='memory.events\x00'}, 0x30) fcntl$lock(r0, 0x26, &(0x7f0000000180)={0x2, 0x0, 0x100000000, 0xc58e, r1}) ioctl$FIBMAP(r2, 0x1, &(0x7f00000001c0)=0xfffffffffffffff8) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 611.476103][T29908] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 611.511536][T29908] UDF-fs: Scanning with blocksize 1024 failed [ 611.553370][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:44 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:44 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340), 0x0, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 611.595764][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 611.637678][T29908] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 611.657341][T29908] UDF-fs: Scanning with blocksize 2048 failed [ 611.666079][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 611.687056][T29908] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 611.758211][T29908] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 611.764189][T30268] FAT-fs (loop1): bogus number of reserved sectors [ 611.801634][T29908] UDF-fs: Scanning with blocksize 4096 failed [ 611.808067][T29908] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 611.861292][T30268] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f646508eb6c6f6f703080"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:44 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000010b7705f000000000000000000fd59050000002800050000029120f9b46d2a421a73b51c4cdeda7f743384fe70dd601f384e"]) 06:03:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ocfs2\x00', 0x0, 0x0) 06:03:45 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:45 executing program 4: setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB='/dev/lo\x00\x00\x00\x00'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:45 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:45 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340), 0x0, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x401, 0x10000) [ 612.698394][T30286] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 612.734638][T30286] FAT-fs (loop3): Filesystem has been set read-only [ 612.752817][T30313] FAT-fs (loop1): bogus number of reserved sectors [ 612.772958][T30286] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) 06:03:45 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 612.859944][T30322] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 612.872439][T30313] FAT-fs (loop1): Can't find a valid FAT filesystem [ 612.987907][T30322] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f00000000c0)={0xfffffffffffffffa, 0x8}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$SIOCRSACCEPT(r0, 0x89e3) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000240)=""/150) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) 06:03:46 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340), 0x0, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 613.099863][T30322] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 613.171678][T30322] UDF-fs: Scanning with blocksize 512 failed [ 613.203989][T30322] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 613.302525][T30322] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 613.392766][T30322] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 613.451067][T30322] UDF-fs: Scanning with blocksize 1024 failed [ 613.475663][T30322] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:46 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:46 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:46 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 613.542237][T30322] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 613.576235][T30322] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 613.584552][T30322] UDF-fs: Scanning with blocksize 2048 failed [ 613.609016][T30356] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 613.630112][T30356] FAT-fs (loop3): Filesystem has been set read-only [ 613.638568][ T2488] print_req_error: 36 callbacks suppressed [ 613.638591][ T2488] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 613.652194][T30322] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 613.675357][T30356] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 613.690516][ T2488] print_req_error: I/O error, dev loop4, sector 4096 flags 0 [ 613.700708][T30322] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 613.760296][T30548] FAT-fs (loop1): bogus number of reserved sectors [ 613.785952][T30322] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 613.801786][T30548] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:46 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 613.808490][T30322] UDF-fs: Scanning with blocksize 4096 failed [ 613.868661][T30322] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:47 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:47 executing program 4: mount(&(0x7f0000000080)=ANY=[@ANYBLOB="163558"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x8, 0x101000) mount(&(0x7f0000000180)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='binfmt_misc\x00', 0x80, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) getgroups(0x5, &(0x7f00000023c0)=[0xee00, 0xffffffffffffffff, 0xee01, 0xee01, 0x0]) getresuid(&(0x7f0000002400), &(0x7f0000002440)=0x0, &(0x7f0000002480)) setxattr$trusted_overlay_origin(&(0x7f0000002600)='./file0\x00', &(0x7f0000002640)='trusted.overlay.origin\x00', &(0x7f0000002680)='y\x00', 0x2, 0x2) stat(&(0x7f00000024c0)='./file0\x00', &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000280)='./file0\x00', 0x2, 0x4, &(0x7f0000002340)=[{&(0x7f00000002c0)='wV', 0x2, 0x6}, {&(0x7f0000000300)="73257d26077bda62130c9ea7bfe461a1f5b93d8852c467bc0da46105610a20d52870775666e3eb9ebf5f", 0x2a, 0x1f}, {&(0x7f0000000340)="fb2b34af947fc5da8c2749f62ecc5165a3bf944177a587f94dd7b14175a907055e984c30619cb5a0444fe43a0c9d55295459407cd6a665fb8d568c36b478d8be7d6c1ee33726e8854783c607ca76037c1f5c8c2ef6c0988b6ba523d83c779b64fac79aa4ba5f658bcde91e5b9b65148f922fc4e6d5ce3aea6b928b6911295a3f6575aa39d9d6caee638d8d9e6c6bf4225b76a4afc019ffcdb7d7c6072a6cfb8cf0ea6e108c7e5f4d08f9122c2e95ab074499f277ee72edfc0f8ba03a85914253c4b6f0b4fe7ea3427d63f427e059f4fa96df9c390449cc4384ce28c5ac9fb443bb9d6d363cdf30c5b377073f87a52121cb0d2a235ece6b9d18edd6d971b61b22d55f3c0e75ac392155faf84eff4998192de18afdd1448f31719ae2bcb38082d5586c70b660f93701c1ffbeb1e0382a4f7ee0b21df2f46592fa9868f486970d68b237aef74bd70682226a5f7abcb72d1902b273ecf4f1b12851cf4d9684f272679a2831ce354543aeab3ca1c282347e0f8538eb7fb6b59c815494d82fa19ca7e738f9a33fa3267333a4a7704ae4c4d46103e83f185cf4462809c731e66ba4883e6e49cc06772fd8ad0c220a21d11c10541c4e1cf5ae4d5665b07a5325e97290f227935d7909c79623a0778bf7da47caee27d2c3c2e926ab2366856e0837a304b020e6dbe7886074f282b68d3efa0506f6e24eb91cf18c5e9126c5906005f40eb314b576e67a697d5a3f05b2785f95706a62e9752a48125fdbdc8d26494571ab08a070e30153e02a0e256ed60d30d8fea9ddd447d2ca6d98dfc0a6615fa69a75b2a143486f2b96556bf404b93e1cf60e64cf95224db6ab8f506550cc5caacf4829453661076bbacb3d4f9bc57c63d65816272e6aa873bc3f90855d7e166c8a3adca8d2694c1c6c56e1d139cfe4cdf6c6fc41797679e50921018931de25c3bc8351ce22cc773e44798eabcfcffc5c6f20a79bfa77c2c70fba43532ffa47986d810a1bb7f3d65413d8234fcfd6ef8bfd012321ec79334843b102b52ce09c2135873064d10c9c99b4140eb0f324db732cc55f26c4959c00872e2cc949bdb8aaf592f7e1515e469a50d9668b38f1bef6b0fb524d072c655967658de6e03f3809a2e83520539e73a9ec55dc3ed1b507a23a6b42e73da9e74b2024afdd4d3383ace41cba474a0a84b2fa334b57c8e5e904c7bb41c0cb67a73e96346d58cbdd2bf43819e3c40ba497f9f0cce54b5d9ecba642e9750acf34334bfbec3dd8325878fde5abb08297e4cba2abbd0090430e5e4e96d9b8bd5bf05b4182ff517a392d567bdb5f7833ef70c150ec8b436be8ab9addf1d68504410ec168f06ccb5df96554efcfd7bacfccc8ad070bbd6680f5f27d7c167c06430736a98cf0952cb827ff778b33e53a1dc42c1d59bb7656aa2677c561f5978b18a4e96890e0dd1dd5e1d9907ffb6a33a9f3cb0ccbd9353a4ed46a8fd4ba4aae46fd460c93f0b68ae1df5edb3086a223e6aa80352cf08a050471d81a80d4911008e415889a540fbb62add9ecaaa6ea8b28c3243148c013a6656b8c2e89b3dbff080167fb10108c5910e729ebdd127bd0f636b2e110bbf174730b433dc065a27ccd3935ecaa59cca97272a6e43d514b89e5eed08713760a12abaf3f8851fb8f8884ca6aae383a8a7da7f2a2b5f8c3497bfc05ca1bf296edf35533774a4d8a402e0e553c276de03df1943845566a251a1bbc6648797b332dbc662375c82a47e5fee83a753c69479b43c3fe0b5e07b6f325d9ac535315e3d26665880ccc6d522f27b3933e11277abcff87884b3a82e44765ade41b28ad0a6e89eda5de36ff9fa3062e20b6921c861d8969481b02fd55c5666539d39a206c13065ab7cee9d931aac40f60ddc879def24032e50df9500704f5e21481af3cae63bfaf87884c1870061150bd5f25b976ecdcef232336241baabc506648014cea77179102a61f9bd865c8d7229c0c497549d754b3434ce0a89ac3cf6caddfd8ff350a7a277a491ea89333c68fd51ba83725e760de32ec6c6db5d7d38f4e1ca96c86e1458ddba67cb404094764ac09b2270446be335f6c82666e043ab2ed361739c5884e3203eb99539a25eaf0999475677106eebf9c72aed5f86896cc0517e727472c87d25c5af5e16fb080c90895d515344ca093de88a7ccca631623548ffdb2be28e83223282b586a4ca7bba5831819d5cb8253f9cd06d65a73d2f6cdbe9ddaec9d7e5bc597187a5c086d9ce3608bb599cc2d592f5a1dbe6bc7893b7d3784f0349d66a9ab6fefe7931c99cc7d128f19cc39a18917084883a4af051bca2bffeeb03ab059b3f7f16ecaf1b99672dbf1037559f7efded6a53efc4b735857c8fcd47b4e492ccdc32071b9a2a7e5f54734e7bb98b8541324f00834bcf6ebc01ddbbbde8b52ec0cbc9f476cbed83a8a5f2c35c597c96e78b8b9f884fb3ff946bcc5a49b785101711fd125e23c3e6f9f9890e4e237fbf516413de4dd8013bb78ad0a7f7a1cb52d47ed6e3e5e7c33007b3e5171a5ef1e2a87551e3e5c6bb64be4fb2bc208898018dd2b13e7fbd9b9534ac26f3aa452612e898d4e467327b2ef3521b746d53ceff71c2315ecd542ad47323705391db09b8abacd4d0b9f35b4c1eff8435d1cff5439269cac4ce51f5ac74da4b141f0bb25b2e32d54374c4001b4f42a1cfda2bade7fbf17a8eb89d2cfbbaee6b11c771a82cc5cb14db6d4302a8d3193480509cf11c5d9b7084f030bab5121d1a6ef14ad3357251ecb25669bb7289431f697a66a1f41a12c95f61a857a55117993c798cdaf752230d84a04bc24203cd749a44d57996f8e14911ec05c1ddb0690320e7cef2b944e51c86be8b1a9eb4f7797c6ef5d5f753e35e9d117a40fe9d621e53067dafbe819b45a2315320c821c24aad853eb7cfad0040a2347a4d0635497223008c7bddf84609182ec358ba78a62fb35c3f285641922e1e86c5e184b84aa89284cc3fb8b6acbf90d546b0fb25f1a5f4d66a583f8e4afafbcbc20febd56c50d77a9bc9232c2ce6976b0fc42af564b57706ad8ee49db0f85be83f4fca7370c44f2c9250dd74cc6ee025f5cc99d7a4bc09ebaf6764864742ba9be41cc0dedbc48e1d13628401ff67573178c472988a5c1db8c7b56dec615055e410067343a244bc3d047f33649e9b039a520a04580106844024827636d139fa23bbe5397fc2edabefd4447774633528d6a34b575a40264ad5cc51bf9586fc2810e90969e33835f525ea7b1729a2f3e1e8d0d90d007b2dcc3bbb9c607a5b9fcc7e2ee6d96e1495a706f1d5af4b28afc8e1e879e1620193bbda85ac92efe558674be2aa52b3f1b46de6dbee89ca55706be68801990f98f2a034402f14378d809578a886b8af0b18b043c85cf0b4e03ee0c28736be3b8828716012ad5705dd5b6654f69508d71c685fbc2cb0677d62955f9e535e431c8ef52192fb81d29fb61b2c3440ca4fbd57f85de4f55803116b180cadf7302bc06311a65e025704fddcb435b93715395ce3ae7b197b22e3a0c1a4c529f43b55c5f5722ee7dafc7b34ef2d53a0b75db4e2c312ddf5f84158314baca73d2664c842b4433e48e0f0a202e4e8356991685d6464bf1795b901c41172394291dc6b82bd02a1a06bd7ee8529f2f2558a30763a14a9b7a74906b2fe9387d030084070fa96e2beda7c7098ce80844a9bdeb3b62a4a65228b7add3ef177fc7c16e266815f4a2d7e1353ccc3427d18f281e627869f0b2debf91dd3feb0bf8d3fc1f8a960a87ae9b89dff0b87fa00f582635b0f8d6c07adbb290ddbf0959d1ef57a29adb10dbf06dfc49ee48302099b711c257fe8168dc51179fdd2a4487f5f46e072e54be031535cdeb83d24e65e0c56e3deadd30598114a9c4227358321d4742f458d620aae025aa518a85fb094a91d9d0469beaed68a349eb148b8613793cf43496d413569aedd0e7d5d5cd79f83f6488b59f7339417426051bb64f2917a4c29be2e13f0e7c07267ef5b26fe2571c82d62a84faf24f1cedeb4eb0b5323c4f69cb78444ce3b2b2df7cbdb8ce9dfdd71f3fbfd79f0cd749eaebec0f81d21c5bd113f2a0b107a60b00847cc9cd47874248d0febc064978022940dded3fce560faeb52cf24870a38fa17b4ba34790c4f49ade0ef72decd0080bf8fc4aac312a0ce644bc4e0ff6dab6995aeba6ed08af576416cc400650f6374c6a08d6e4d577a0767a42718e7af707545ba1cf6ebc60fe4bf98f99deafb4a139097152dd9c68cfd197b056c0e9db092aabeef7e4b608d3ac925da863927166216d1c90fcd232a08bbf052acdb3dcbbbd78a431b582752bff39413ad0e9d520cb1f3d5606e42b780a43fbb75c7a6b5bd9072b8b052cf55bff550c36760d4963b9bd3123ed7bfda46f211adfe05949710a6b9a156303241189754054937815df923f01d23be258c74bf2a50b5bca510b2d78faf630af21a0b16b297877f75298845c15980ae46b1b6b6696b7e8d6739208e7bec63fdffe7b6852bd8f94920c1d0432e67a8c800dc8f51ee51ea09b18beb0d3018932b576d3cad2801ff2b649026d472edabe6dcf71c68a7ee235a927d76d88363cfeb665a0bed9f3ac614159b798329b8dda66905d1ed58f9a218d4a3d812ac1f0f2edf48e04829087173bc58d9a086af851b5a55f75476e6e8354ff6eaf10b54cb1968a4462e2bd8692aa05f35b9ba3e9b9aa76e4332d8dff3ee61ea20b4ff18bbbe7a999b6f5212c11dd8e1420fc7a83be2274384f582b2de15633f3b443432c2c370cd774b5bd05cc49fd935d1ef62129dd3f1946204a54ab2d65e6c76814cf4c3322bc4f009119459d3e7710482f4a204754e33b934c6986f3ff7917790e847b6201edf295ea91aa37f3617e569773f87c2e6746e1960a734645eb9ac1eab5188a582c07b4f6842a77e502aa9de3825c4f1047e7bc73312699c14a87ea10fb2245af1841c547842badab51174a75760a54c51455ebcb3b1d04d0fb33e3d5e21d9e5a2b3b2ccdbc86f29656367e746e221dfadbd3c1d09f7ef1f25fe885af5800010d0a75428774be7a8c4cd8b7e79922293600bfa4544c018ab15a4ffd6a11a519a9c2ddc2c76caff28858ac7ca2cf2723b67b31674ce216ece7b9bf0ff35f39c6f620caad008fbf52bd5560d0d440ff5fd7979779df8ab8a905ba0b0250aba39e093e52875b1b3d814d310504be1bb377ac2c004bb8ee93b0f9177f3cd4357715a3543847c9c377cf57b937489cfbff7906700f0c75cbebf4a8fdcc196cfb761d8db8dc873629838926d72a9c9426977051a31facbf514f7b82137ba59313327defc1b31135ea29793246a69d831be08d611b7ed77c2f5b9f40b438d510b55508d02e66137b60ce2922d42d1a5e62632a664f49214a6d589eb1462a3807a72398f0c5ad54e0c356c8f45fa6175f6dc5d072d394f324bc1ee551f9d40ff4e55088c9f5d9b350b58e5a424a8cea8a44783676c7986c5de9f9f93009826e6d94bd1cb2bbfdc1ee631ddc7981c229074514df266b68381b84e3bfc16c65151d85d689a4397a55007235be9c6155afeb09561a823c6ce08799025b245980f79079035d1062222178c9cb22c41913f9bf9358eb4df3ac6375aa1aaac30bfc7a75c9330c517a25cc114215e887061cc33b95d8b537d4d826dbe157e96fed3f3f6be059ba2da1a4b1c604ee8df3935caaefb35b87612a55007abbde29f249bfb521ff7de17b54b1696926664e00be0acf48093184701610fc1eefa71315bd9618cf76ecbb576e0440a675e53da15be30dbb64f733e0d882218507", 0x1000, 0x2}, {&(0x7f0000001340)="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", 0x1000, 0xfffffffffffffffd}], 0x100000, &(0x7f0000002580)={[{@resgid={'resgid', 0x3d, r1}}], [{@smackfshat={'smackfshat', 0x3d, 'binfmt_misc\x00'}}, {@subj_user={'subj_user', 0x3d, '/dev/nbd'}}, {@uid_gt={'uid>', r2}}, {@fowner_eq={'fowner', 0x3d, r3}}]}) 06:03:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f6403762fcb756c6c623000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='hpfs\x00', 0x2020800, 0x0) 06:03:47 executing program 0: pipe(&(0x7f0000000100)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x40000, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.evel^\xcc0\x18\x04\xa0\x98>B\xd0\x87Ats\x00\xd7\x980u\xfa:\xa8\xb4\x94\xa7\x91\x16\x9b\v\x9c8\x94\x01\xeb\xda\x0f`\x934\xc2\xf9,K\xf0+b\x1a\x0e\x8b\xa7\xc3\\5<\xd8\xba\xfb3\xf4\b\x05\xd4\xea\xf5\xb7\xd2\xe7\x1a\xc7\xe0\xea\xe3\xf2\x19\x17Pj\xdb\xdc\xe0Q\xaf\xa39%\xffL\x94\xaf\xc9\f\x1f\xc8\xd5Z\xfd\x00\x19^\r#J', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) 06:03:47 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:47 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:47 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 614.603049][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 614.614575][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 614.623501][T30786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:47 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 614.652730][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 614.660302][T30786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 614.731614][T30786] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 614.765456][T30815] FAT-fs (loop1): bogus number of reserved sectors [ 614.781085][T30786] UDF-fs: Scanning with blocksize 512 failed 06:03:47 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="0000000000000000f7ffffff000000d605356125634ab4a3c33472d043e00f37"]) [ 614.825855][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 614.855527][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 614.865787][T30786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 614.914990][T30815] FAT-fs (loop1): Can't find a valid FAT filesystem [ 614.931984][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 614.939886][T30786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:48 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:48 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 614.988134][T30786] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 615.001708][T30786] UDF-fs: Scanning with blocksize 1024 failed [ 615.094038][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 615.239078][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 615.247095][T30786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 615.264257][T30786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 615.278892][T30786] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:48 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 615.309252][T30786] UDF-fs: Scanning with blocksize 2048 failed [ 615.331318][T30786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 615.343351][T30786] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 615.411847][T30786] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 615.466009][T30786] UDF-fs: Scanning with blocksize 4096 failed [ 615.485096][T30786] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:48 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 615.544101][T30906] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 615.577465][T30906] FAT-fs (loop2): Filesystem has been set read-only 06:03:48 executing program 4: mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x400) mount(&(0x7f00000001c0)=ANY=[@ANYBLOB="2f300058a53f7a22e61739107bdd208783230edb008328499417401ea05a320177ed52e14564671655c394dcf6ac7c69a6c4c5ea43527b63e82b6050c99bef3e2275cd9b98586e3cda09b8ec5be32d95aeb360db23fa8778a33382b2dd209fc8200f14bbd93172701bf98ad8ee865d52af3d799ad85e666be5ed9548054b9ad1b5ae33ee7bfc122b756194cc651896f011946c6725e3"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) umount2(&(0x7f0000000040)='./file1\x00', 0x9) 06:03:48 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 615.652988][T30906] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:03:48 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 615.731791][T31136] FAT-fs (loop1): bogus number of reserved sectors [ 615.738331][T31136] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file1\x00', 0x10000, 0x40) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @remote}}, 0x8000000000000, 0x3, 0x80000001, 0x100, 0x2}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000240)={r1, 0x1000}, &(0x7f0000000280)=0x8) 06:03:48 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001600)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000001700)=0xe8) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000001740)='/dev/full\x00', 0x20000, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0xf, 0xa, &(0x7f0000001440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffff}, [@exit, @call={0x85, 0x0, 0x0, 0x3f}, @alu={0x4, 0x6, 0x2, 0x5, 0xf, 0x10}, @ldst={0x2, 0x3, 0x2, 0xa, 0xb, 0x180, 0xffffffffffffffff}, @alu={0x7, 0x0, 0xf, 0x9, 0xf, 0x20, 0x8}, @ldst={0x0, 0x2, 0x0, 0xb, 0xf, 0xfffffffffffffff8, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0xb}]}, &(0x7f00000001c0)='syzkaller\x00', 0x7, 0x4, &(0x7f00000014c0)=""/4, 0x0, 0x1, [], r0, 0x9, r1, 0x8, &(0x7f0000001780)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000017c0)={0x7fff, 0x9354, 0xc3, 0x1400000000}, 0x10}, 0x70) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r2, &(0x7f0000000080), 0x2001007f) sendmsg$nl_generic(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x41802}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0x11e8, 0x3d, 0x400, 0x70bd2c, 0x25dfdbfe, {0x15}, [@typed={0x8, 0x7f, @ipv4=@broadcast}, @generic="04575e90945978139ee0f80fd849d3fe8b7c753f0886880c4df7179ccd9cf391279975b454080cd4f8cc2033620e119abd37ec658db0b4a58699c138e4db36735a4b7405f5fc449279828889a075f266415e3f39c0cea4a61e3dbd931120f8823f6cdc82035cfbfe9216068b959a6b6a2bbe7c6430c57062a14dc990001aed2da313b7cdf5", @nested={0x1144, 0x66, [@typed={0xc, 0x34, @str='\\*nodev\x00'}, @generic="71c918b9c11b99ba6f26dab3cd9517d73ecac9a8147a585c8330bd83908f36e3def33503af4ee5184a51e20075787e143ac9c4f594866b37b6af8f3921b28b39123bb32e4d2953173c168c7334db1b660f8c8eed0de2a939b087e7e65b42e8aa0c995ee7814827078f07e97e8949c6a255b954ad2c2527ad7d00aff9b8f9895fae", @generic="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", @generic="769261f11838b776323a469db935645769a5580de3702844c819c3579da6faf64faf37d957aaadd7ec8f0b0baa1a18ca651cfef7e1ea8b2fc72fb4e7c6de02cc66b6cdb57b7098881b5fc0a433c3e2db4ed17ea2e8144eaabb155b870c0ac0e008fc909f7904e40a27bd761b12666f1188c279cf55711dbd63714d00cffc2d914d11ab181d89942649d37ce4087aa5f7864d6a7c75bbec8789bcfd3d36b59c5292c139be9df2b5032df380a0fc82388629c4"]}]}, 0x11e8}, 0x1, 0x0, 0x0, 0xebd2b2f2c57a5389}, 0x40000) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 615.970230][T31156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 616.021665][T31156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 616.063638][T31156] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 616.137471][T31156] UDF-fs: Scanning with blocksize 512 failed 06:03:49 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 616.191437][T31156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:49 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 616.238140][T31156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 616.279948][T31156] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 616.303245][T31156] UDF-fs: Scanning with blocksize 1024 failed [ 616.342924][T31156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:49 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[]) [ 616.444518][T31156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:49 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 616.567875][T31156] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 616.630162][T31155] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 616.645522][T31156] UDF-fs: Scanning with blocksize 2048 failed 06:03:49 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 616.675549][T31155] FAT-fs (loop2): Filesystem has been set read-only [ 616.686038][T31156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 616.712885][T31155] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 616.723934][T31156] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 616.749184][T31156] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 616.757426][T31382] FAT-fs (loop1): bogus number of reserved sectors [ 616.775546][T31156] UDF-fs: Scanning with blocksize 4096 failed [ 616.803975][T31382] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:49 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 616.833702][T31156] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000100)={0x8001002, 0xfffffffffffffffa, 0x1}) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:50 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(0xffffffffffffffff) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 617.125290][T31499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 617.182945][T31499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:50 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 617.285641][T31499] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 617.310447][T31499] UDF-fs: Scanning with blocksize 512 failed [ 617.358726][T31499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:50 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000300)='pids.current\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)) dup3(r1, r1, 0x30b8165fe27e0403) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000100)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000380)=ANY=[@ANYBLOB="af104ed43e2bab22a4da9f6510e3da3095d363b2f522402a4e39cee152cb2cef2b466e640b8ff0b565111e14935c4cad362760188ad3d8ac64001039f51f2129e31c1aeecb9e8200da9f64b2f52fd10c1f24fb753f7ffa597d699c0642f04c683e86c825bbb8347d0a9ce93179e76c3cb429084934b372026f36009c73ede3c9baee356bf7e05ea79b0b2028f1a7d0ac8f548f69c7ebe98aa5f4eb1e1800020000160eb15bf4c19c488e4bbcb5b192117ec32dcee4e12a95197e945793f3732677b9751e78330df70b200ac0e8839f6b0cdde300d1baf940090495a906562fcdf1834bf32a426d"]) [ 617.431254][T31499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:50 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 617.499664][T31499] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 617.561767][T31499] UDF-fs: Scanning with blocksize 1024 failed 06:03:50 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 617.623026][T31499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 617.647020][T31499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 617.665065][T31487] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) 06:03:50 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 617.722193][T31499] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 617.748633][T31487] FAT-fs (loop2): Filesystem has been set read-only [ 617.765782][T31620] FAT-fs (loop1): bogus number of reserved sectors [ 617.801412][T31620] FAT-fs (loop1): Can't find a valid FAT filesystem [ 617.802026][T31499] UDF-fs: Scanning with blocksize 2048 failed [ 617.838765][T31487] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:03:50 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(0x0, 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 617.892381][T31499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:51 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x0, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) r1 = perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x100000010, 0x3, 0x0) dup3(r1, r1, 0x0) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, 0x0) socket(0xa, 0xa0b8d84598fb17e9, 0x2) ioctl$sock_ifreq(r2, 0x8924, &(0x7f0000000000)={'batadv0\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x9b, "a94cc8c38963c932b93d15565d20725029e7561fb5c78106198c48c646a97eee642f6d329bf10700a71acf9d2b82d902dbe70e26a2971943e7386a73f01e4aba176f6985e9108984ac86120dec6f8fa3a6e0cd3b5af38fe0b66847214375b8cd028fd465f30e41a04c16a85da5ad527dbd943d7d483fa3e2184430e8895188dcaa18d3b340a3ccae0f7e160134349c11ae5beea006642d0e8c8cc9"}, &(0x7f0000000000)=0xa3) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000240)={r3, 0x2, 0xfb, "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"}, 0x103) [ 618.036279][T31568] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 618.059681][T31499] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 618.095445][T31568] FAT-fs (loop3): Filesystem has been set read-only [ 618.162102][T31568] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17) [ 618.175744][T31499] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 618.238275][T31499] UDF-fs: Scanning with blocksize 4096 failed 06:03:51 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 618.282549][T31499] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:51 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:51 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x80, 0x0) [ 618.627906][T31767] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 618.669126][ T2489] print_req_error: 30 callbacks suppressed [ 618.669139][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 618.693575][T31767] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:51 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 618.712342][T31767] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 618.759306][T31767] UDF-fs: Scanning with blocksize 512 failed [ 618.783039][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 618.792188][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 618.800868][T31767] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 618.846435][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 618.854461][T31767] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 618.858667][T31673] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 618.880425][T31874] FAT-fs (loop1): bogus number of reserved sectors [ 618.892017][T31673] FAT-fs (loop2): Filesystem has been set read-only [ 618.905981][T31767] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 618.922116][T31673] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 618.934383][T31874] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:51 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 618.952877][T31767] UDF-fs: Scanning with blocksize 1024 failed [ 618.982147][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 619.048670][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 619.056276][T31767] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:52 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x0, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:52 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 619.142839][ T2488] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 619.150533][T31767] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 619.169457][T31767] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 619.244602][T31767] UDF-fs: Scanning with blocksize 2048 failed [ 619.273763][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 06:03:52 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 619.308967][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 619.316824][T31767] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 619.341737][ T2488] print_req_error: I/O error, dev loop4, sector 4096 flags 0 [ 619.349543][T31767] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 619.441917][T31767] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 619.483075][T31767] UDF-fs: Scanning with blocksize 4096 failed 06:03:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000010b7705f00000000000000000000fe0000000000000000007f16184fc0cf54ed6af6d65fd2b47582cb3b3e85f630935d3ea41aa47dc509e7b49a29ac07772bc5fd8dc690a236ad4bafa22fc4769b4a15b75afacf57158f3b1f7456fc065e903195513e1d216eb393a89b4cf5205cf66e2ad191b6d71f"]) 06:03:52 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(0x0, &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 619.539160][T31767] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 619.611840][T32052] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 619.719415][T32052] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:52 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 619.785173][T32052] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 619.867450][T32052] UDF-fs: Scanning with blocksize 512 failed [ 619.906163][T32147] FAT-fs (loop1): bogus number of reserved sectors [ 619.920539][T32052] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 619.964847][T32147] FAT-fs (loop1): Can't find a valid FAT filesystem [ 619.968464][T31991] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 619.978480][T32052] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 619.986257][T31991] FAT-fs (loop2): Filesystem has been set read-only [ 620.017212][T31991] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) [ 620.064679][T32052] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:53 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(0x0, &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 620.105840][T32052] UDF-fs: Scanning with blocksize 1024 failed [ 620.131098][T32052] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:53 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x0, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 620.161300][T32052] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 620.227418][T32052] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 620.281646][T32052] UDF-fs: Scanning with blocksize 2048 failed [ 620.332158][T32052] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 620.384353][T32052] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 620.469340][T32052] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 620.497233][T32052] UDF-fs: Scanning with blocksize 4096 failed [ 620.520593][T32052] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f646f8940c40b01c2ef658e416c6f6f703000c4e8bab26a564db7b722778b1414e663d1df22aa021ba138de563071d3f3df097133cc1d58f7357786a2594d9aaa5c8c1fde23b7493d79de093443d0fe030c37e4ac74cd25dc424de38a01f08d8ea924595f496b1ea1bf4d8fd553119998a022670f2b19d282b8f53aa27d53b942d1cee22f4c7b20c2c60af4f0cde88305efdc3a"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:53 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:53 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(0x0, &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f6465762f6c6f6f7012d6d8e871875925960e4bd4d84c33300016642dab7b6d074202fa4e1ee86a3c05de14838fd7ac7e"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:03:53 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000240)={0x0, @bt={0x3, 0x6, 0x0, 0x1, 0x5, 0x8000, 0x9, 0x7, 0xc7b, 0x0, 0xfffffffffffffff8, 0x3794, 0x1, 0x401, 0x10, 0x4}}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) 06:03:54 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', 0x0, 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 620.987625][T32458] FAT-fs (loop1): bogus number of reserved sectors 06:03:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="ac0eb0"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 621.040044][T32458] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x402000, 0x0) io_uring_enter(r0, 0x0, 0x1f, 0x1, &(0x7f0000000100)={0x2}, 0x8) 06:03:54 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:54 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 621.324373][T32486] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 621.350489][T32486] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:54 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000100)=0x5) r1 = getpid() sched_rr_get_interval(r1, &(0x7f0000000380)) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x10000) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@ipv4}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000004c0)=0xe8) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000002c0)={0x7ff, {{0xa, 0x4e24, 0x80000001, @mcast1, 0x2}}}, 0x88) [ 621.405849][T32486] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 621.421799][T32486] UDF-fs: Scanning with blocksize 512 failed 06:03:54 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 621.457387][T32486] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 621.500379][T32575] FAT-fs (loop1): bogus number of reserved sectors 06:03:54 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', 0x0, 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 621.542230][T32575] FAT-fs (loop1): Can't find a valid FAT filesystem [ 621.558050][T32486] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 621.621614][T32486] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 621.630565][T32486] UDF-fs: Scanning with blocksize 1024 failed [ 621.720775][T32486] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 621.770377][T32486] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 621.837171][T32486] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 621.898486][T32486] UDF-fs: Scanning with blocksize 2048 failed [ 621.955486][T32486] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 622.028631][T32486] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 622.091012][T32486] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:55 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', 0x0, 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 622.132660][T32486] UDF-fs: Scanning with blocksize 4096 failed [ 622.138770][T32486] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 622.187870][T32590] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 622.193029][T32513] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 622.222060][T32513] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 622.236995][T32590] FAT-fs (loop2): Filesystem has been set read-only 06:03:55 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 622.274254][T32513] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 622.275486][T32590] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:03:55 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) r3 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_AGP_RELEASE(r3, 0x6431) fchown(r0, r1, r2) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x1000, 0x8, [0x8, 0x670d50b4, 0x7fff, 0x1, 0x7f, 0x4, 0xff, 0x3ff]}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000180)={r4, 0x2, 0x7}, &(0x7f00000001c0)=0x8) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000000010b7705f0000000000000000000000000000000001000000"]) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) [ 622.341678][T32513] UDF-fs: Scanning with blocksize 512 failed [ 622.351140][T32513] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:55 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 622.422263][T32513] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 622.458543][ T302] FAT-fs (loop1): invalid media value (0x00) 06:03:55 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:55 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 622.477858][T32513] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 622.501965][ T302] FAT-fs (loop1): Can't find a valid FAT filesystem [ 622.514147][T32513] UDF-fs: Scanning with blocksize 1024 failed [ 622.553848][T32513] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 622.575327][T32513] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 622.600094][T32513] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 622.608963][T32513] UDF-fs: Scanning with blocksize 2048 failed [ 622.626534][T32513] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 622.662718][T32513] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 622.711132][T32513] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 622.730318][T32513] UDF-fs: Scanning with blocksize 4096 failed [ 622.772541][T32513] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:56 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) acct(&(0x7f0000000180)='./file0\x00') ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000100)={0x7e}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='tdf\x00', 0x0, 0x0) 06:03:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x4}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x8}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r1, 0x4, 0x7fffffff, 0x8, 0xfffffffffffffbff, 0x101, 0x0, 0x9, {r2, @in={{0x2, 0x4e23, @remote}}, 0x5, 0x8, 0xa5e, 0x10000, 0x10000000}}, &(0x7f0000000380)=0xb0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0)=0x4, 0x4) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000100)=""/49) 06:03:56 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:56 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) rt_sigprocmask(0x0, &(0x7f00000000c0)={0x7bab}, &(0x7f0000000100), 0x8) socket$packet(0x11, 0x3, 0x300) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) 06:03:56 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400f40, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, 0xffffffffffffffff) mount(&(0x7f0000000240)=@loop={'/dev/loop', 0x0}, &(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='aufs\x00', 0x4, 0x0) 06:03:56 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:56 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x0, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 623.426670][ T501] FAT-fs (loop1): invalid media value (0x00) [ 623.444841][ T501] FAT-fs (loop1): Can't find a valid FAT filesystem 06:03:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x77, 0x301003) mkdir(&(0x7f0000000180)='./file0\x00', 0x100) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000100)={0x8, 0xfffffffffffffffa, 0x2, 0x4}) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 623.581869][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 623.589125][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 623.656963][ T625] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:56 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 623.732324][ T2488] print_req_error: 38 callbacks suppressed [ 623.732332][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 623.746021][ T625] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 623.811706][ T625] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 623.819912][ T625] UDF-fs: Scanning with blocksize 512 failed [ 623.868878][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 623.878547][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 623.890791][ T625] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 624.000472][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 624.008786][ T625] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:57 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 624.116789][ T625] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 624.176204][ T625] UDF-fs: Scanning with blocksize 1024 failed [ 624.207983][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 06:03:57 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 624.239722][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 624.247494][ T625] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:57 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 624.328320][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 624.336732][ T625] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x8080000, 0x3, 0x200, 0x0, 0x5}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0x1a, &(0x7f0000000180)='wlan1..!self\xdc#vmnet0]bdev\x00'}, 0x30) syz_open_procfs(r1, &(0x7f0000000240)='stat\x00') fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L-', 0x6}, 0x28, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="000000000000040010b7705f007691216e00"/32]) [ 624.392507][ T625] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 624.404117][ T787] FAT-fs (loop1): invalid media value (0x00) [ 624.420067][ T625] UDF-fs: Scanning with blocksize 2048 failed [ 624.459573][ T787] FAT-fs (loop1): Can't find a valid FAT filesystem [ 624.470897][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 06:03:57 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 624.504120][ T2488] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 624.514087][ T625] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:57 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 624.562837][ T2488] print_req_error: I/O error, dev loop4, sector 4096 flags 0 [ 624.570889][ T625] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 624.589379][ T625] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 624.600143][ T625] UDF-fs: Scanning with blocksize 4096 failed [ 624.620700][ T625] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 624.648280][ T845] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 624.664635][ T845] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 624.675794][ T845] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 624.715918][ T845] UDF-fs: Scanning with blocksize 512 failed [ 624.790557][ T845] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 624.901765][ T845] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 624.911395][ T845] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:58 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) pread64(r0, &(0x7f00000000c0)=""/75, 0x4b, 0x0) [ 625.044032][ T845] UDF-fs: Scanning with blocksize 1024 failed [ 625.073815][ T845] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 625.090301][ T845] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 625.100571][ T845] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 625.134020][ T845] UDF-fs: Scanning with blocksize 2048 failed 06:03:58 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 625.146527][ T845] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 625.199419][ T845] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 625.211708][ T845] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 625.221287][ T845] UDF-fs: Scanning with blocksize 4096 failed [ 625.233887][ T845] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:03:58 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:58 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:03:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x183183, 0x0) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000100)=0x6e) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 625.386405][ T1009] FAT-fs (loop3): bogus number of reserved sectors [ 625.409569][ T1031] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 625.427237][ T1035] FAT-fs (loop1): invalid media value (0x00) [ 625.437892][ T1009] FAT-fs (loop3): Can't find a valid FAT filesystem [ 625.456548][ T1035] FAT-fs (loop1): Can't find a valid FAT filesystem [ 625.477109][ T1031] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:03:58 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0x0, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 625.506468][ T1031] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 625.544041][ T1031] UDF-fs: Scanning with blocksize 512 failed 06:03:58 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 625.623082][ T1031] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 625.643258][ T1031] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 625.727132][ T1031] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 625.735388][ T1031] UDF-fs: Scanning with blocksize 1024 failed [ 625.771331][ T1031] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 625.854586][ T1031] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 625.904140][ T1031] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 625.953690][ T1031] UDF-fs: Scanning with blocksize 2048 failed [ 626.008390][ T1031] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:03:59 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0x0, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:03:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080)=0x100, 0x12) setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f0000000100)=0x6, 0x4) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000010b7705f0000000000000000000000000000000000000000bc7e60771d7dcceede69"]) [ 626.073627][ T1031] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 626.129436][ T1031] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:03:59 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 626.190500][ T1031] UDF-fs: Scanning with blocksize 4096 failed 06:03:59 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 626.258701][ T1031] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 626.399153][ T1257] FAT-fs (loop3): bogus number of reserved sectors [ 626.421971][ T1259] FAT-fs (loop1): invalid media value (0x00) [ 626.451251][ T1259] FAT-fs (loop1): Can't find a valid FAT filesystem [ 626.491214][ T1257] FAT-fs (loop3): Can't find a valid FAT filesystem 06:03:59 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x81) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x3, @ipv4={[], [], @broadcast}, 0x4}}, [0x7fff, 0x7fffffff, 0x7fffffff, 0x5, 0x7fffffff, 0x10001, 0x92b3, 0x5d93fbc3, 0x2, 0x1, 0xffffffffffffffff, 0x7, 0x100000001, 0x800, 0xffff]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000340)={r1, @in6={{0xa, 0x4e23, 0xffffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x8, 0x1}, &(0x7f0000000080)=0x90) mkdir(&(0x7f0000000100)='./file0\x00', 0x800000000000) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 626.500745][ T1176] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) 06:03:59 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000010b7705f00000000000000000000000000000000000000004a3c974da5a57b516e0cc8a78fd3404b5a40e7b6bfa5663b5f1b513ef4839c472476425c7e67cd2f095fec247ac10a6621a0d1cb1c669deda6dd2b8e3c42b701c4fa82e9deb9d86032771187576e27cf8c2dfcdc94e5f7f92d4a99a8a754acc39dbba744b3d93fc0c6e23932c14696b19c91d1f86cb01ca7425d4accac9930f7bf32"]) [ 626.554403][ T1176] FAT-fs (loop2): Filesystem has been set read-only [ 626.579451][ T1176] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:03:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f6465762f6c6f6f703000c8210433383c4739ef3ae8c4f3e6201d47242dbf6640e373d2e8c8929fcb66b333ec37b293ba758b2300000000000000047472e03baee46f7347d83861423c13b4b9b6a88975f1011d54c89345d697c1ac23f2dbea3c561daa8146e18a3f50bb56806e27642a72be2e6328b9818817fea6ebf60248c390fc726b6cf63e812b6c"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) rename(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x109) 06:03:59 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 626.798739][ T1278] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 626.894456][ T1278] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 626.990942][ T1278] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 627.029445][ T1246] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 627.049252][ T1278] UDF-fs: Scanning with blocksize 512 failed [ 627.077953][ T1246] FAT-fs (loop5): Filesystem has been set read-only [ 627.091126][ T1278] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 627.114933][ T1246] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17) [ 627.134535][ T1278] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 06:04:00 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0x0, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 627.176020][ T1278] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 627.215555][ T1278] UDF-fs: Scanning with blocksize 1024 failed 06:04:00 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:00 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 627.272733][ T1278] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 627.331770][ T1278] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 627.346808][ T1278] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 627.358509][ T1278] UDF-fs: Scanning with blocksize 2048 failed [ 627.392340][ T1296] FAT-fs (loop1): invalid media value (0x00) [ 627.398446][ T1296] FAT-fs (loop1): Can't find a valid FAT filesystem [ 627.415859][ T1278] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 627.450286][ T1278] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 627.482374][ T1341] FAT-fs (loop3): bogus number of reserved sectors [ 627.549168][ T1278] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 06:04:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) fcntl$addseals(r0, 0x409, 0x6) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) 06:04:00 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 627.601658][ T1341] FAT-fs (loop3): Can't find a valid FAT filesystem [ 627.622583][ T1278] UDF-fs: Scanning with blocksize 4096 failed 06:04:00 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 627.675714][ T1278] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 627.747203][ T1284] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 627.821227][ T1284] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 627.854926][ T1284] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 627.926217][ T1284] UDF-fs: Scanning with blocksize 512 failed [ 627.968835][ T1284] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 06:04:01 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 628.046337][ T1284] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 628.066996][ T1284] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 628.091689][ T1284] UDF-fs: Scanning with blocksize 1024 failed [ 628.107842][ T1284] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 628.129072][ T1284] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 06:04:01 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 628.197550][ T1284] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found 06:04:01 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 628.249959][ T1284] UDF-fs: Scanning with blocksize 2048 failed [ 628.295508][ T1284] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=256, location=256 [ 628.331238][ T1589] FAT-fs (loop1): invalid media value (0x00) [ 628.345313][ T1284] UDF-fs: error (device loop0): udf_read_tagged: read failed, block=512, location=512 [ 628.380535][ T1589] FAT-fs (loop1): Can't find a valid FAT filesystem [ 628.408956][ T1284] UDF-fs: warning (device loop0): udf_load_vrs: No anchor found [ 628.431002][ T1284] UDF-fs: Scanning with blocksize 4096 failed 06:04:01 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 628.451218][ T1284] UDF-fs: warning (device loop0): udf_fill_super: No partition found (1) [ 628.492436][ T1656] FAT-fs (loop3): bogus number of reserved sectors [ 628.555051][ T1656] FAT-fs (loop3): Can't find a valid FAT filesystem 06:04:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0xa000, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000100)=0x7, 0x4) 06:04:01 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 628.728139][ T1670] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:04:01 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 628.775623][ T2489] print_req_error: 50 callbacks suppressed [ 628.775634][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 628.804383][ T1670] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:04:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x1f, 0x80) [ 628.914042][ T1670] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 628.952003][ T1670] UDF-fs: Scanning with blocksize 512 failed [ 628.979819][ T1680] FAT-fs (loop3): bogus number of reserved sectors [ 628.991926][ T1680] FAT-fs (loop3): Can't find a valid FAT filesystem [ 629.006809][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 629.020321][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 629.051234][ T1670] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 629.128123][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 629.136928][ T1670] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 629.149224][ T1670] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 629.162240][ T1670] UDF-fs: Scanning with blocksize 1024 failed [ 629.170726][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 629.186312][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 629.194980][ T1670] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 629.213921][ T2488] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 629.227982][ T1670] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 629.281545][ T1670] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 629.307415][ T1670] UDF-fs: Scanning with blocksize 2048 failed 06:04:02 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 629.331426][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 629.347450][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 629.355170][ T1670] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 629.365211][ T2489] print_req_error: I/O error, dev loop4, sector 4096 flags 0 [ 629.372858][ T1670] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 629.382751][ T1670] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 629.390642][ T1670] UDF-fs: Scanning with blocksize 4096 failed [ 629.396967][ T1670] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:04:02 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x8800, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000200)={0x18, 0xd, 0x1, {{0x88, 0x3, 0x1}, 0x8}}, 0x18) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) syz_extract_tcp_res(&(0x7f0000000180), 0x4, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x1}) 06:04:02 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 629.496186][ T1677] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 629.505218][ T1693] FAT-fs (loop1): invalid media value (0x00) [ 629.511335][ T1693] FAT-fs (loop1): Can't find a valid FAT filesystem [ 629.519650][ T1677] FAT-fs (loop2): Filesystem has been set read-only [ 629.532993][ T1677] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17) 06:04:02 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 629.678698][ T1701] QAT: Invalid ioctl [ 629.711848][ T1699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:04:02 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 629.763537][ T1699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 629.777728][ T1699] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 629.819954][ T1699] UDF-fs: Scanning with blocksize 512 failed [ 629.870853][ T1699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 629.916976][ T1810] FAT-fs (loop3): bogus number of reserved sectors [ 629.959619][ T1810] FAT-fs (loop3): Can't find a valid FAT filesystem [ 629.963658][ T1699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:04:03 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:04:03 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f00000000c0)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB="1da57e23", @ANYRES16=r1, @ANYBLOB="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"], 0x39c}, 0x1, 0x0, 0x0, 0x800}, 0x80) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000600)={0x8, 0x9b, 0x780f}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) delete_module(&(0x7f0000000640)='mime_type]\x00', 0x0) [ 630.010231][ T1699] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 630.018587][ T1699] UDF-fs: Scanning with blocksize 1024 failed [ 630.077234][ T1699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 630.138677][ T1699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 630.239558][ T1699] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:04:03 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 630.302477][ T1699] UDF-fs: Scanning with blocksize 2048 failed 06:04:03 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 630.368072][ T1699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 630.435293][ T1699] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 630.475489][ T1838] FAT-fs (loop1): invalid media value (0x00) [ 630.503270][ T1843] QAT: Invalid ioctl [ 630.511779][ T1838] FAT-fs (loop1): Can't find a valid FAT filesystem [ 630.538763][ T1699] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:04:03 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 630.601901][ T1699] UDF-fs: Scanning with blocksize 4096 failed 06:04:03 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 630.661556][ T1699] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) [ 630.683358][ T1701] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:04:03 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 630.726589][ T1701] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 630.750473][ T1701] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 630.794159][ T1701] UDF-fs: Scanning with blocksize 512 failed [ 630.801143][ T1701] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 630.830329][ T1701] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 630.880574][ T1857] FAT-fs (loop3): bogus number of reserved sectors [ 630.930893][ T1857] FAT-fs (loop3): Can't find a valid FAT filesystem [ 630.939770][ T1701] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 630.960865][ T1701] UDF-fs: Scanning with blocksize 1024 failed [ 630.996632][ T1701] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 631.078430][ T1701] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:04:04 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) write$binfmt_elf32(r0, &(0x7f0000001600)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x6, 0x7, 0x200, 0x3, 0x3, 0x3, 0x101, 0x2c4, 0x38, 0x8c, 0x101, 0x2, 0x20, 0x1, 0x3, 0x8, 0x7}, [{0x6474e551, 0x2, 0x100, 0xbb5, 0x10001, 0xfffffffffffffffd, 0x7, 0x3}], "a7fc11b9eb1682d168cfed153c0eecd0b0c3ced392b8299db830712b1b05dd7d9985f453224e1188f2aaae7983c0a564fb62bbfdebeef729db8e744a2ed52aaf616aaefe98a5a72ea846b680484efb11421baaf75e8be88ba62bfe032f17126bd30ec162fffc7b98a9d0380aa55f9a23200ee21105e0fdbe1cd479779451112c2b7ba6e39e1fcfd7b16c5f09c063b9a86748e4174b5c850f369e3eb8b3cc0dc7b8fe2b89f517e26c0a70739b0997a9706d50433fb9711656ea0a265e0973b1f082931a609d51bfe7af027e3ea3651e7978f0b34fe4cc237e32afb70a7b36275b83320db66f7dcefe71aa177b32d3a237786cbb0b2d", [[], [], [], [], [], [], [], [], []]}, 0xa4d) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000100)={0x5, &(0x7f0000000300)=""/129, &(0x7f0000001580)=[{0x1f, 0x52, 0x9, &(0x7f0000000180)=""/82}, {0x7, 0x48, 0x3ff, &(0x7f00000003c0)=""/72}, {0xffffffffffffff59, 0x1000, 0x0, &(0x7f0000000440)=""/4096}, {0x7, 0xb6, 0x8, &(0x7f0000001440)=""/182}, {0x1ff, 0x77, 0x8, &(0x7f0000001500)=""/119}]}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) fgetxattr(r0, &(0x7f00000000c0)=@random={'btrfs.', 'vmnet1\x00'}, &(0x7f0000000240)=""/159, 0x9f) [ 631.124625][ T1701] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 631.157702][ T1701] UDF-fs: Scanning with blocksize 2048 failed [ 631.188921][ T1701] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 631.237409][ T1701] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 631.256814][ T1701] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 631.277251][ T1701] UDF-fs: Scanning with blocksize 4096 failed [ 631.297549][ T1701] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:04:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f6465762f6c976f703000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:04:04 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:04 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:04:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000180)=""/251, &(0x7f0000000040)=0xfb) 06:04:04 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:04 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 631.748424][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:04:04 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 631.801962][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 631.835620][ T2094] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 631.872893][ T2098] FAT-fs (loop3): bogus number of reserved sectors [ 631.879434][ T2098] FAT-fs (loop3): Can't find a valid FAT filesystem [ 631.899607][ T2094] UDF-fs: Scanning with blocksize 512 failed [ 631.942434][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 632.007766][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 632.036156][ T2094] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 632.120023][ T2094] UDF-fs: Scanning with blocksize 1024 failed [ 632.199712][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 632.232963][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:04:05 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[], 0x0) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 632.250317][ T2094] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 632.269667][ T2094] UDF-fs: Scanning with blocksize 2048 failed [ 632.325899][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:04:05 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000200)=0x4) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000180)={0x10002, 0x0, [0x2f, 0xff, 0x1, 0x0, 0x1000, 0x0, 0x4110, 0x7fffffff]}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="00a34756faba24393b0a76dc451b94683d3f00000000000000457f871f7d16cbe13759271200"/60]) fanotify_init(0x5, 0x0) 06:04:05 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 632.449591][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 632.460506][ T2094] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 632.506877][ T2094] UDF-fs: Scanning with blocksize 4096 failed [ 632.556859][ T2094] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:04:05 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:05 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[], 0x0) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:04:05 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 632.653769][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 632.701919][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 632.720586][ T2094] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 632.735778][ T2094] UDF-fs: Scanning with blocksize 512 failed [ 632.789417][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 632.819457][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 632.835036][ T2094] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 632.844831][ T2094] UDF-fs: Scanning with blocksize 1024 failed [ 632.857273][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 632.942560][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 632.970608][ T2338] FAT-fs (loop3): bogus number of reserved sectors [ 632.994450][ T2338] FAT-fs (loop3): Can't find a valid FAT filesystem [ 633.005147][ T2094] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 633.069092][ T2094] UDF-fs: Scanning with blocksize 2048 failed [ 633.092251][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 633.145542][ T2094] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:04:06 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[], 0x0) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 633.251689][ T2094] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 633.296915][ T2094] UDF-fs: Scanning with blocksize 4096 failed [ 633.321327][ T2094] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:04:06 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='jfs\x00', 0x0, 0x0) 06:04:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080)=0x8, 0xfffffffffffffef8) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f00000000c0)={0x5, 0x100, 0x7, {0x400, 0x79, 0xfffffffffffffff9}}) 06:04:06 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:06 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:06 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:04:06 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x200, 0x0) dup(0xffffffffffffffff) syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x4, 0x0) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000006c0)={0x11a0c00, 0x8, 0x4, 0x2, {0x0, 0x7530}, {0x5, 0x1, 0x3, 0x2308, 0x6, 0x6b8, "796be70b"}, 0x6, 0x2, @userptr=0x6, 0x4}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm_plock\x00', 0x101001, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000440)='/dev/snd/pcmC#D#p\x00', 0x187, 0x80) syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x401, 0x0) syz_open_dev$adsp(&(0x7f00000004c0)='/dev/adsp#\x00', 0xfffffffffffffffc, 0x40000) syz_open_dev$vcsn(&(0x7f0000000500)='/dev/vcs#\x00', 0x100000000, 0x105081) syz_open_dev$usb(&(0x7f0000000540)='/dev/bus/usb/00#/00#\x00', 0x2, 0x5f776c1932ff250d) syz_open_dev$dspn(&(0x7f0000000580)='/dev/dsp#\x00', 0x8000, 0x4c280) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000680)=0x2) openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/autofs\x00', 0xa0000, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$RTC_PIE_ON(r2, 0x7005) r3 = open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x100) execveat(r3, &(0x7f0000000100)='./file0/file0\x00', &(0x7f00000002c0)=[&(0x7f0000000180)='-\x00', &(0x7f00000001c0)=']wlan1\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='/dev/loop'], &(0x7f0000000340)=[&(0x7f0000000300)='/dev/loop'], 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="9108000000000000052fd550adbab2123bb03000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) 06:04:06 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000010b7705f000000000000000000000000000000000000003e0000"]) [ 633.899966][ T2590] FAT-fs (loop3): bogus number of reserved sectors [ 634.012047][ T2590] FAT-fs (loop3): Can't find a valid FAT filesystem 06:04:07 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:04:07 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xffff, 0x0) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000100)=0x1c) mkdir(&(0x7f00000001c0)='./file0\x00', 0xfffffe) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 634.406975][ T2488] print_req_error: 50 callbacks suppressed [ 634.406989][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 634.426078][ T2488] print_req_error: I/O error, dev loop4, sector 256 flags 0 [ 634.441199][ T2648] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 06:04:07 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 634.498028][ T2489] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 634.506011][ T2648] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:04:07 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 634.540182][ T2648] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:04:07 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 634.582007][ T2648] UDF-fs: Scanning with blocksize 512 failed [ 634.602996][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 06:04:07 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 634.637974][ T2488] print_req_error: I/O error, dev loop4, sector 512 flags 0 [ 634.660053][ T2648] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 634.775253][ T2488] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 634.784838][ T2648] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 634.819190][ T2761] FAT-fs (loop3): bogus number of reserved sectors 06:04:07 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x80, 0x0) write$cgroup_int(r0, &(0x7f0000000180), 0xfffffffffffffe01) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000240)={0xe0, ""/224}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)=ANY=[@ANYBLOB="00000000000002000000705f000000000200000000000000a424499200000000"]) [ 634.919630][ T2761] FAT-fs (loop3): Can't find a valid FAT filesystem [ 634.953023][ T2648] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 634.960767][ T2648] UDF-fs: Scanning with blocksize 1024 failed 06:04:08 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5"], 0x40) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 635.042939][ T2489] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 635.050663][ T2489] print_req_error: I/O error, dev loop4, sector 1024 flags 0 [ 635.095809][ T2648] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 635.124463][ T2489] print_req_error: I/O error, dev loop4, sector 2048 flags 0 [ 635.133357][ T2648] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 635.219388][ T2648] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found 06:04:08 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100)={0x3f, 0x544, 0x2, 0x1ff}, 0x8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000140)={0x8, 0x0, 0x9}) write$cgroup_int(r1, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) [ 635.275910][ T2648] UDF-fs: Scanning with blocksize 2048 failed [ 635.316662][ T2732] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17) [ 635.326441][ T2488] print_req_error: I/O error, dev loop4, sector 64 flags 0 [ 635.334189][ T2648] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 635.355679][ T2648] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 [ 635.369833][ T2732] FAT-fs (loop1): Filesystem has been set read-only [ 635.382141][ T2648] UDF-fs: warning (device loop4): udf_load_vrs: No anchor found [ 635.414563][ T2732] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17) [ 635.445218][ T2648] UDF-fs: Scanning with blocksize 4096 failed [ 635.453856][ T2648] UDF-fs: warning (device loop4): udf_fill_super: No partition found (1) 06:04:08 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:08 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:08 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5"], 0x40) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:04:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1f, 0x204000) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x3) 06:04:08 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x20) mount(&(0x7f0000000180)=ANY=[@ANYBLOB="2f6465010400006f70300089fe8cb5698d8a5519bc549d23718cab443d63c8ce45c6460622e490adaeccaaf178388103d095adf3b90e4091a57d78fb674268233ff71c2fd9a8337f7d29f9d543b0ee48763731fa"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) [ 635.854942][ T2987] FAT-fs (loop3): bogus number of reserved sectors [ 635.899535][ T2987] FAT-fs (loop3): Can't find a valid FAT filesystem 06:04:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='udf\x00', 0x0, 0x0) setxattr$security_evm(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.evm\x00', &(0x7f0000000340)=@ng={0x4, 0x4, "af9eb6b05f56dbfc8081efbc"}, 0xe, 0x1) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000100)='./file0\x00', 0xf118, 0x1, &(0x7f0000000280)=[{&(0x7f0000000180)="982a2eefac7f0cc2998abbcd64b2e576bffbbe06ef1356bfa9326f63924f2310fe0b48345726e27027abf72451a935e7464a796379e51a6966bb3382515ad5a27547aaa676ceae4ff1b7ea12d837869807eb82036f11883a75bec6ac57697f47e54716d1406a90c18f7a51140101b25e50ecce43d15275d7c6679731acc846d91211340e59c18277c1b655b24b5d85540fbb98bb67db8eaa04c1b6561f59eae8dfe5a6e5d9e36b4a296ae73c90c206cc18a6d53d7b2ed798fa436762dba0d9e70415eb572d21545e29ab39a9adbebc920b413e9e45487ff16d524cbcc685f71e64", 0xe1, 0x6}], 0x21, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.upper\x00', &(0x7f0000000400)={0x0, 0xfb, 0x1015, 0x0, 0x1538c1d2, "e128ddfaf206fc16db367e4fb6aca287", "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"}, 0x1015, 0x2) 06:04:09 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5"], 0x40) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) [ 636.226301][ T3125] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=256, location=256 [ 636.296643][ T3125] UDF-fs: error (device loop4): udf_read_tagged: read failed, block=512, location=512 06:04:09 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:09 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:09 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 636.686599][ T3144] FAT-fs (loop3): bogus number of reserved sectors [ 636.711573][ T3144] FAT-fs (loop3): Can't find a valid FAT filesystem 06:04:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000200)={0x0, 0x5f70b710}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0x4, 0x4) [ 636.755790][ T3146] FAT-fs (loop2): bogus number of reserved sectors [ 636.793286][ T3146] FAT-fs (loop2): Can't find a valid FAT filesystem 06:04:10 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb786"], 0x60) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:04:10 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x5, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:10 executing program 3: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xebaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x0, 0x0, 0x0, 0x4547, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x7, 0x8, 0x80, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x9, 0x4, @perf_config_ext={0x1}, 0x2000, 0x0, 0x0, 0x7, 0x5, 0x2}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) 06:04:10 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, 0x0, 0x0, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb7860c131aef785f25df8e5480dcd79dbe3bfc1deea690e1b2ae74539f93951bd347"], 0x80) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) [ 637.687273][ T3190] FAT-fs (loop2): bogus number of reserved sectors [ 637.696453][ T3192] FAT-fs (loop3): bogus number of reserved sectors [ 637.735881][ T3190] FAT-fs (loop2): Can't find a valid FAT filesystem [ 637.742702][ T3192] FAT-fs (loop3): Can't find a valid FAT filesystem 06:04:11 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000000340)=[{{0x0, 0x0, &(0x7f0000000180)}}], 0x1, 0x8004) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lsetxattr$security_evm(&(0x7f0000000380)='./bus\x00', &(0x7f0000000400)='security.evm\x00', 0x0, 0x0, 0x1) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000180)={0xffff, 0x100}) write$binfmt_aout(r1, &(0x7f0000000680)=ANY=[@ANYBLOB="00000000008b08b7960ff7aa6e041a7700fdff863809aa0063b8f24252b1d85cbf000000000038f70f653f0ffb09f0d536b564df5e0acad550fe203534da91b5b9fb501e1ac4bfa3841f9d63e232b9b2500fb1d96033ccfdff066428eb4cb786"], 0x60) socket$inet6(0xa, 0x0, 0x1000000020000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0x0) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) 06:04:11 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000140)={0x0, 0x0, 0xfffffffffffffffe}) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) getpeername$tipc(r0, &(0x7f0000000180), &(0x7f00000001c0)=0x10) write$P9_RLERROR(r0, &(0x7f0000000200)={0x17, 0x7, 0x1, {0xe, 'memory.events\x00'}}, 0x17) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000a12e9b379270aa477255370010b7705f00000000000000000100"/43]) faccessat(r0, &(0x7f0000000100)='./file0\x00', 0x1, 0x100) [ 791.581654][ T1042] INFO: task syz-executor.4:3130 blocked for more than 143 seconds. [ 791.589694][ T1042] Not tainted 5.1.0-rc6+ #86 [ 791.602943][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 791.615945][ T1042] syz-executor.4 D29336 3130 7832 0x00000004 [ 791.630034][ T1042] Call Trace: [ 791.637631][ T1042] __schedule+0x813/0x1cc0 [ 791.644374][ T1042] ? __sched_text_start+0x8/0x8 [ 791.649236][ T1042] ? rwsem_down_write_failed+0x764/0xc30 [ 791.659456][ T1042] ? _raw_spin_unlock_irq+0x28/0x90 [ 791.667054][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 791.676690][ T1042] schedule+0x92/0x180 [ 791.680779][ T1042] rwsem_down_write_failed+0x774/0xc30 [ 791.688807][ T1042] ? rwsem_down_read_failed+0x420/0x420 [ 791.698627][ T1042] ? mark_held_locks+0xf0/0xf0 [ 791.705751][ T1042] call_rwsem_down_write_failed+0x17/0x30 [ 791.715773][ T1042] ? call_rwsem_down_write_failed+0x17/0x30 [ 791.724059][ T1042] down_write+0x53/0x90 [ 791.728244][ T1042] ? grab_super+0xb4/0x290 [ 791.737101][ T1042] grab_super+0xb4/0x290 [ 791.745788][ T1042] ? lock_acquire+0x16f/0x3f0 [ 791.750493][ T1042] ? drop_super_exclusive+0x30/0x30 [ 791.760020][ T1042] ? test_single_super+0x10/0x10 [ 791.768293][ T1042] ? test_single_super+0x10/0x10 [ 791.777509][ T1042] sget_userns+0x1ab/0x560 [ 791.784245][ T1042] ? kill_litter_super+0x60/0x60 [ 791.789208][ T1042] ? test_single_super+0x10/0x10 [ 791.800076][ T1042] ? kill_litter_super+0x60/0x60 [ 791.807295][ T1042] sget+0x10c/0x150 [ 791.811119][ T1042] mount_bdev+0xff/0x3c0 [ 791.819666][ T1042] ? udf_load_vrs+0xc80/0xc80 [ 791.827868][ T1042] udf_mount+0x35/0x40 [ 791.836143][ T1042] ? udf_get_pblock_meta25+0x3a0/0x3a0 [ 791.843981][ T1042] legacy_get_tree+0xf2/0x200 [ 791.848677][ T1042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 791.859206][ T1042] vfs_get_tree+0x123/0x450 [ 791.866012][ T1042] do_mount+0x1436/0x2c40 [ 791.870875][ T1042] ? copy_mount_string+0x40/0x40 [ 791.880239][ T1042] ? _copy_from_user+0xdd/0x150 [ 791.887400][ T1042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 791.897893][ T1042] ? copy_mount_options+0x280/0x3a0 [ 791.905740][ T1042] ksys_mount+0xdb/0x150 [ 791.910011][ T1042] __x64_sys_mount+0xbe/0x150 [ 791.918967][ T1042] do_syscall_64+0x103/0x610 [ 791.925845][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 791.935923][ T1042] RIP: 0033:0x458da9 [ 791.939847][ T1042] Code: Bad RIP value. [ 791.946221][ T1042] RSP: 002b:00007f8481c44c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 791.958920][ T1042] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458da9 [ 791.969226][ T1042] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000080 [ 791.985399][ T1042] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 791.997848][ T1042] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8481c456d4 [ 792.008994][ T1042] R13: 00000000004c4da1 R14: 00000000004d8a08 R15: 00000000ffffffff [ 792.024367][ T1042] [ 792.024367][ T1042] Showing all locks held in the system: [ 792.035423][ T1042] 1 lock held by khungtaskd/1042: [ 792.040454][ T1042] #0: 00000000292c6512 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 792.056422][ T1042] 1 lock held by rsyslogd/7695: [ 792.061295][ T1042] #0: 00000000a409f14e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 792.077637][ T1042] 2 locks held by getty/7785: [ 792.082772][ T1042] #0: 00000000ecc35230 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 792.098098][ T1042] #1: 00000000a2bef8dc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 792.108131][ T1042] 2 locks held by getty/7786: [ 792.119038][ T1042] #0: 0000000015f48a9f (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 792.128379][ T1042] #1: 0000000014977e13 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 792.145170][ T1042] 2 locks held by getty/7787: [ 792.149868][ T1042] #0: 000000006e0b5e85 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 792.165445][ T1042] #1: 00000000165c78be (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 792.177430][ T1042] 2 locks held by getty/7788: [ 792.186331][ T1042] #0: 00000000cf63627e (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 792.197656][ T1042] #1: 000000006bcd4663 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 792.213774][ T1042] 2 locks held by getty/7789: [ 792.218548][ T1042] #0: 00000000dd086014 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 792.230867][ T1042] #1: 00000000a65b5acf (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 792.246657][ T1042] 2 locks held by getty/7790: [ 792.251353][ T1042] #0: 00000000376df70d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 792.260853][ T1042] #1: 00000000fb5e7a3c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 792.276997][ T1042] 2 locks held by getty/7791: [ 792.282024][ T1042] #0: 000000001ec8a15a (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 792.290985][ T1042] #1: 000000007e89b9cf (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 792.306940][ T1042] 2 locks held by syz-executor.4/3125: [ 792.312815][ T1042] 2 locks held by syz-executor.4/3130: [ 792.318299][ T1042] #0: 00000000da315956 (&bdev->bd_fsfreeze_mutex){+.+.}, at: mount_bdev+0x93/0x3c0 [ 792.334062][ T1042] #1: 000000008dff931c (&type->s_umount_key#63){++++}, at: grab_super+0xb4/0x290 [ 792.346650][ T1042] [ 792.348993][ T1042] ============================================= [ 792.348993][ T1042] [ 792.361011][ T1042] NMI backtrace for cpu 0 [ 792.365461][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc6+ #86 [ 792.373028][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.383087][ T1042] Call Trace: [ 792.386387][ T1042] dump_stack+0x172/0x1f0 [ 792.390730][ T1042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 792.396014][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 792.401655][ T1042] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 792.407640][ T1042] arch_trigger_cpumask_backtrace+0x14/0x20 [ 792.413562][ T1042] watchdog+0x9b7/0xec0 [ 792.417799][ T1042] kthread+0x357/0x430 [ 792.421886][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 792.427435][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 792.433686][ T1042] ret_from_fork+0x3a/0x50 [ 792.438287][ T1042] Sending NMI from CPU 0 to CPUs 1: [ 792.443946][ C1] NMI backtrace for cpu 1 [ 792.443953][ C1] CPU: 1 PID: 124 Comm: kworker/u4:3 Not tainted 5.1.0-rc6+ #86 [ 792.443959][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.443963][ C1] Workqueue: bat_events batadv_tt_purge [ 792.443970][ C1] RIP: 0010:lock_acquire+0x1f4/0x3f0 [ 792.443982][ C1] Code: e8 03 80 3c 10 00 0f 85 c7 01 00 00 48 83 3d 42 ff 3a 07 00 0f 84 3b 01 00 00 48 8b 7d c8 57 9d 0f 1f 44 00 00 48 8d 65 d8 5b <41> 5c 41 5d 41 5e 41 5f 5d c3 65 8b 05 db e8 a9 7e 83 f8 3f 0f 87 [ 792.443986][ C1] RSP: 0018:ffff8880a941fc70 EFLAGS: 00000286 [ 792.443994][ C1] RAX: 1ffffffff11252ee RBX: ffff88808cfebbf8 RCX: 0000000000000000 [ 792.444000][ C1] RDX: dffffc0000000000 RSI: 0000000000000001 RDI: 0000000000000286 [ 792.444005][ C1] RBP: ffff8880a941fc90 R08: 00000000e1a28f45 R09: ffffffff895e6a94 [ 792.444010][ C1] R10: ffff8880a9410b50 R11: ffff8880a9410280 R12: ffff88808cfebc10 [ 792.444016][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 792.444022][ C1] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 792.444026][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 792.444058][ C1] CR2: ffffffffff600400 CR3: 000000009f2a2000 CR4: 00000000001406e0 [ 792.444061][ C1] Call Trace: [ 792.444065][ C1] _raw_spin_lock_bh+0x33/0x50 [ 792.444068][ C1] ? batadv_tt_purge+0x10b/0xa30 [ 792.444072][ C1] batadv_tt_purge+0x10b/0xa30 [ 792.444076][ C1] process_one_work+0x98e/0x1790 [ 792.444080][ C1] ? pwq_dec_nr_in_flight+0x320/0x320 [ 792.444083][ C1] ? lock_acquire+0x16f/0x3f0 [ 792.444087][ C1] worker_thread+0x98/0xe40 [ 792.444090][ C1] kthread+0x357/0x430 [ 792.444094][ C1] ? process_one_work+0x1790/0x1790 [ 792.444099][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 792.444102][ C1] ret_from_fork+0x3a/0x50 [ 792.446074][ T1042] Kernel panic - not syncing: hung_task: blocked tasks [ 792.631959][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc6+ #86 [ 792.639491][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 792.649552][ T1042] Call Trace: [ 792.652862][ T1042] dump_stack+0x172/0x1f0 [ 792.657284][ T1042] panic+0x2cb/0x65c [ 792.661192][ T1042] ? __warn_printk+0xf3/0xf3 [ 792.665788][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 792.671423][ T1042] ? ___preempt_schedule+0x16/0x18 [ 792.676552][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 792.682708][ T1042] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 792.688869][ T1042] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 792.695045][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 792.701211][ T1042] watchdog+0x9c8/0xec0 [ 792.705388][ T1042] kthread+0x357/0x430 [ 792.709481][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 792.715045][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 792.721293][ T1042] ret_from_fork+0x3a/0x50 [ 792.726648][ T1042] Kernel Offset: disabled [ 792.730994][ T1042] Rebooting in 86400 seconds..