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", @nested={0x140, 0x86, 0x0, 0x1, [@typed={0x12, 0x34, 0x0, 0x0, @str='\x02-%$]/\\.$&^\\\xcd\x00'}, @typed={0x8, 0x3d, 0x0, 0x0, @uid=r1}, @typed={0xe, 0x5c, 0x0, 0x0, @str='%(}\x97#\\#}*\x00'}, @typed={0x8, 0x3a, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x3e, 0x57, 0x0, 0x0, @binary="0a17d615f1bf08e7104b16863bd83b70f956f75556b21623531eafa077adda71ccfc67a108348167361548fa60f25e8689ce62a58e1e75e56b4f"}, @typed={0x8, 0x8b, 0x0, 0x0, @ipv4=@multicast1}, @typed={0xbd, 0x1c, 0x0, 0x0, @binary="3b5ee1dbacbbbc428c82fde5fa7c19499f32058faad8eb97e88bd27c4be52edc2b26a1ddfaeb5acce1fb60faeef1dfec0e19c207184fb91bd0d43873b6b39f90d2a86a6daa32ec2a8cc47b7e9816af27bdaed4b6df6d8670e77bdf57d37486c6158cbbb4921dbd462b8cb7d279a4e30286f5f532c110eebb7cb9098e74396ee09b83c9a91ef8249c04385bacb309178ae90326bf300f524afd7d28ca3274549608cb8d6466f52dedba12711d4357f6ced2dd8920ad8228713c"}]}, @generic="4437ad455ff8788ca890c61975e28ccb9e2f1691777c37f0e6704ba2635ab4", @generic="a5596fb51d283a8804e444355af7154f9411a133620047206188b18b4f5b97c7c0c09cc01ea40d0a16a37ecf87639543e410abba7bf5a1a7d262ec708bd83595090b944274fa40e0b199276f5a2696b43a06ba7189f1c45cd3d6583ef0983eae234b2097628ce1090fb952e30d0a5be4cce282f9026f1b3ab0d11a5b5860594e40f7c8763c910aeba891af1edde0c02ecdb1727b495d1c391bb1c7e580d302534c0fe7051fd1eccd8eeb07aa8dbc7991f09c72"]}, 0x1224}, {&(0x7f0000000380)={0x1ac, 0x24, 0x2, 0x70bd26, 0x25dfdbfd, "", [@typed={0x8, 0xd, 0x0, 0x0, @uid=r2}, @generic="e893e577b789bb76d266f90962ec596a372812088d4d6a9ed412c95bc0c60ae88f5256ff9a54004dc744293b0888d1a4f8c7c4fe271819af3c853c8983662596979f6e9087573e5fbac1", @generic="1f58d8be7b1b379f988d79a5a8ccd30430cbd595175235dbec16f30dc03316b74de74c45e85236a34fa8f8a066e27245e003298af682a89e73862070b80a3b82090d25ae1965a0550f3a16d24cf1ec3540a709fa7808cf25132b487701c0757c350cf31076d526450efa59d31b4020405116f87ecc2e42cb48f97bbcd1b440640cad83f4af3655aecfd784811709999bfa49b6094dfbfcf89703f6176b90bbff8649e0e1e59eefa5b5ccb9c6c506fd899b756d0cbc02e3002a521ef43af1505b", @typed={0x8, 0x1d, 0x0, 0x0, @fd=r3}, @generic="f564f2cd8abfbe184e64592a375bb42b6977713724f538a6fb47b25ca79ab0a1d3e2ae3da8b03ba4c16542191fea8aab8e02f3f0824e0d43551313601c01f16e911c9ca32b15761cea676951b63cb2201e50d912665103cd7057448ccd13027e3fa93f7b0c2840627b1a4f25c7f78bab9d282e1f5dbc0f0e1fa698dd79604a3a4b32"]}, 0x1ac}], 0x2, 0x0, 0x0, 0x4}, 0x8001) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f00000000c0), 0x492492492492627, 0x0) 00:48:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680), 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 369.458982] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 369.472987] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:42 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socket(0x11, 0xa, 0x80000001) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) 00:48:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 369.749978] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 369.805297] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680), 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 369.984050] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:42 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x9, 0x0, 0x7f, 0x6, 0x0, 0x3, 0x24220, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x4000, 0x40, 0x8, 0x7, 0x9, 0x4, 0x7}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 00:48:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x0, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 370.078198] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 370.148977] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 370.161605] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:42 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) sendmmsg$sock(r0, &(0x7f0000000980)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x2, @private1={0xfc, 0x1, [], 0x1}, 0xff}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000100)="3312d46ed1081adb5e19dc3db550df9693e42affa3fd7d6eeb92f1e615c07617b32b859d4a20adc5f346cb8de077c79c95ab0e2b48b8d6e330adb1eef768223f1a7cfebf054e5051e3f886783d6fa12ea251a3d0059b5ec40f", 0x59}, {&(0x7f0000000240)="f2ac32b714983ba4391be557b1948c2369e96b4ce2057415b8d023f7b70f4a08b4d6997af6e4481e2c82b4c8cb3e71e656c78c99f372636fef037eb3e5cfb8ab36fc3f2cacd8fce2ba5dff3f72082932e43a1ed022bc2299813ec22616d1d752a41489c8dea235e0a5d948857c71a8d454c1fca4cdccaeb577c7dfa41d6fe8dfd5f008227f54a7e030da2d17117753cdc74249070da5dd7b4648f689b900a44711", 0xa1}, {&(0x7f0000000380)="fdd31225452d1a83e121ae29619efae446f9877eb027499492c44011f5107d091e4a17630cd13ab4eb94295326620273da2bae7e9b87ae75b45fc6ab7b8383c2b28e31422b9a1ed858ec1d6f153d52d97cd3c3cf97d327a10aff9e00054e03b2c3a7c65038d6f42eaf9fc8f34f4e225fe0d63483a56c50acd0c4c19d580a77beddf80a197d5bac8f0d8fafa894b1f49bd8d19f7c5878cf00c711f98b04877466bcfb06147a9cc3189e560a998d07d5955414002e52948c4cef03c087f0a18dc3a8618cc57f10499da4c51b33fcf6", 0xce}, {&(0x7f0000000480)="17650931af49055b6541d83ac831c7e6f7d98c693abb6bb8abaf4d4641303cf1bc9d50c1adc5a43c3f2efa519561dc2a7a55356e5cfc53cd8c37ff1ce845c9777fa3cab8b8ee81a950b76e4ad0116743eb8d5c8347c7a199faa1a50d5e29cfe546d9ca5bc45e8617245bc0c394a435418a7b2c29dd8dc3a158c7744e28f6314bcd6b80046bf98f7f02dc8026869786eb514295d8b2ae86bbe63c5451e5e49797eda76a4eb644e0c0a186deb4c566d68a65737fa4523144f29b51a2", 0xbb}], 0x4, &(0x7f0000000180)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x18}}, {{&(0x7f0000000540)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x60249084}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000640)="b8394938ec3ee07b272a705cee6fc91c774496a30700acefcecf099571d42d0335918ce6771443cc4c97a0c761243a4a66c88fe7eda03b7057e549856ddc15ee9e58adc0ed37ad65711235706683984c13d67431831325a4dfdb14a5b0236cad6049a3013e6bf352250b2f4775df33f2a0042462ece51182da77961680a9238d260aa488dc70fd6bf222030d9cb2da", 0x8f}, {&(0x7f0000000700)="741f6747c3459fd89e0ef6f4045df3b1ae1eefdab02e2c3e1e206bde7f73d0f3bd2247404bfbf83265cfee03e1af51b33b886a2f74eaf5ac41b639410139e30e0753c7e5a3b846cd2598e2599b9a2e4fedf02b97c95a2e93e563906ce2dca72978f24bd4b1974e9085fe5879be7eaf04e1a40710721d31474c68209ec063135da69ae4bd02a2197f34e81acb67d336f4a0423214905c976280fd314aa5cc808e0a5be63f263d58501f152e1d20405fe06553008cf7460ae4ec1f1bc1f0151cf1ed", 0xc1}, {&(0x7f0000000800)="3a6dec62b4c2340ee5251292e7bdce27d940d7dbd2f2ee6c3bd1b792f9ed0699d0352a60d4600f5cd60d7e093fdfcea591c0d021b8c6527266c1dde8b76a2d18b02c6643b864e9c72c3055751e717335d3fa45bcc1e3d76e73a827ab699da0982b689c770f3088afc90dcf533a84c3e13beca105908f9ed449ba79ac77990e8254d0aab841e5eb7bcc7c650dec9416683d6a2d94f51cc92d27071b32bae680ab9aa6db541a7ce97bbd24727fdb277806bbeeeba0756a95ef6766e8fdba2685c8b2f9fce50cb23fab0433e3b7b0d7ded75854452e9edaf483b78b2608", 0xdc}], 0x3, &(0x7f0000000900)=[@timestamping={{0x14, 0x1, 0x25, 0xfff}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x10001}}, @mark={{0x14, 0x1, 0x24, 0x8}}], 0x78}}], 0x2, 0x44000) 00:48:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680), 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 370.462009] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 370.515052] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:43 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076783b5e30d480003e7102800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x2f, 0x6, 0xf, 0xad3, 0x1, @private1={0xfc, 0x1, [], 0x1}, @private2, 0x7820, 0x7800, 0x80000001, 0x2}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@bridge_newvlan={0x40, 0x70, 0x10, 0x70bd25, 0x25dfdbff, {0x7, 0x0, 0x0, r0}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x3}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x1f}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x40, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x6, 0x2, [@TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x40}}, 0x0) accept$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000540)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x40, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x6, 0x2, [@TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x40}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000640)={0x5a4, 0x0, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8, 0x1, r0}, {0xb4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8, 0x1, r2}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x600000}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r0}}}]}}, {{0x8, 0x1, r0}, {0x1ec, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x8cd}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}]}}, {{0x8, 0x1, r0}, {0x14c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r0}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5a4}, 0x1, 0x0, 0x0, 0x20008080}, 0x0) [ 370.557254] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 370.558096] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 370.630672] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x0, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 370.679799] nla_parse: 4 callbacks suppressed [ 370.679826] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 370.734693] FAT-fs (loop2): Filesystem has been set read-only [ 370.743784] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 370.762523] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 370.773552] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 370.784259] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.0'. [ 370.786894] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 370.802912] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 370.821356] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 370.833997] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 370.834914] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 370.864793] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 00:48:43 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) r1 = dup(r0) sendmsg$nl_route_sched(r1, &(0x7f0000003940)={&(0x7f0000003880)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003900)={&(0x7f00000038c0)=@gettaction={0x20, 0x32, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x840}, 0x44) [ 370.919569] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 370.979434] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 370.989274] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 371.023561] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 371.025097] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 371.053975] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:43 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076783b5e30d480003e7102800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x2f, 0x6, 0xf, 0xad3, 0x1, @private1={0xfc, 0x1, [], 0x1}, @private2, 0x7820, 0x7800, 0x80000001, 0x2}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@bridge_newvlan={0x40, 0x70, 0x10, 0x70bd25, 0x25dfdbff, {0x7, 0x0, 0x0, r0}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x3}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x1f}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x40, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x6, 0x2, [@TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x40}}, 0x0) accept$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000540)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x40, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x6, 0x2, [@TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x40}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000640)={0x5a4, 0x0, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8, 0x1, r0}, {0xb4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8, 0x1, r2}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x600000}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r0}}}]}}, {{0x8, 0x1, r0}, {0x1ec, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x8cd}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}]}}, {{0x8, 0x1, r0}, {0x14c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r0}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5a4}, 0x1, 0x0, 0x0, 0x20008080}, 0x0) 00:48:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 371.076019] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 371.102650] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 371.135485] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 371.163384] FAT-fs (loop5): Filesystem has been set read-only [ 371.186681] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 371.211851] audit: type=1800 audit(1617842923.683:161): pid=21018 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=245 res=0 [ 371.218351] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 371.257701] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:43 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) r1 = dup(0xffffffffffffffff) getpeername$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r1, 0x89fb, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000100)={'syztnl2\x00', r2, 0x29, 0x0, 0x0, 0x0, 0x5a, @empty, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8, 0x80, 0x4, 0x40}}) 00:48:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000640)) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 371.314117] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 371.341520] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 371.368733] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 371.392893] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 371.431999] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 371.471913] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 371.491691] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.3'. [ 371.531015] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:44 executing program 0: r0 = perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x4, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="3c00000010001fcfbf33311377248f1c872d2bf1b75bee000000", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x3, 0x1, 0x29, 0x7, 0x0, 0x0, 0x40, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x5, 0x8}, 0x180, 0x8e9d, 0x0, 0x0, 0x10000, 0x1f, 0x80}, 0xffffffffffffffff, 0xe, r0, 0x0) r1 = socket(0x10, 0x80002, 0x0) socket(0x1d, 0x6, 0x8001) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 371.559700] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 371.573591] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:44 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) r1 = dup(r0) sendmsg$nl_route_sched(r1, &(0x7f0000003940)={&(0x7f0000003880)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003900)={&(0x7f00000038c0)=@gettaction={0x20, 0x32, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x840}, 0x44) [ 371.621188] audit: type=1800 audit(1617842924.093:162): pid=21050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=246 res=0 00:48:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x0, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 371.720483] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:44 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 371.809623] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:44 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076783b5e30d480003e7102800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000000300)={'ip6gre0\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x2f, 0x6, 0xf, 0xad3, 0x1, @private1={0xfc, 0x1, [], 0x1}, @private2, 0x7820, 0x7800, 0x80000001, 0x2}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=@bridge_newvlan={0x40, 0x70, 0x10, 0x70bd25, 0x25dfdbff, {0x7, 0x0, 0x0, r0}, [@BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5, 0x3, 0x3}}, @BRIDGE_VLANDB_ENTRY={0xc, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_STATE={0x5}}, @BRIDGE_VLANDB_ENTRY={0x10, 0x1, 0x0, 0x1, @BRIDGE_VLANDB_ENTRY_TUNNEL_INFO={0xc, 0x4, 0x0, 0x1, @BRIDGE_VLANDB_TINFO_ID={0x8, 0x1, 0x1f}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4}, 0x8000) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492627, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x40, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x6, 0x2, [@TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x40}}, 0x0) accept$packet(r1, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000540)=0x14) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x40, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x6, 0x2, [@TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x40}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000000c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000580)={&(0x7f0000000640)={0x5a4, 0x0, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8, 0x1, r0}, {0xb4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x3f}}}]}}, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfff}}}]}}, {{0x8, 0x1, r2}, {0x7c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x600000}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r0}}}]}}, {{0x8, 0x1, r0}, {0x1ec, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r0}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x8cd}}, {0x8, 0x6, r0}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r0}}, {0x8}}}]}}, {{0x8, 0x1, r0}, {0x14c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xffff}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r0}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x5a4}, 0x1, 0x0, 0x0, 0x20008080}, 0x0) [ 371.876940] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:44 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8, 0x0) perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) r2 = signalfd4(r0, &(0x7f0000000100)={[0x3]}, 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x8, 0x3f, 0x81, 0x0, 0x0, 0x82, 0x400, 0xa, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x80000000, 0x1, @perf_config_ext={0xfffffffffffffff9, 0x7f}, 0x1, 0x9, 0x6, 0x2, 0xffffffffffff62d3, 0x8, 0x80}, r1, 0x8, r2, 0x8) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) 00:48:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 372.027886] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000640)) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x0, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 372.225875] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 372.332727] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:44 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076787e616e000002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00', 0xffffffffffffffff) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE(r4, &(0x7f00000001c0)={0x0, {'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0}}, 0x120) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) bind$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000800}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x38, r2, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8001}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x48000) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@mpls_getroute={0x3c, 0x1a, 0x200, 0x70bd2a, 0x25dfdbfe, {0x1c, 0x10, 0x0, 0x81, 0xfc, 0x1, 0xfd, 0x2, 0x200}, [@RTA_DST={0x8, 0x1, {0xb95b}}, @RTA_DST={0x8, 0x1, {0x40, 0x0, 0x1}}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x40}, @RTA_TTL_PROPAGATE={0x5, 0x1a, 0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000041}, 0x80) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) [ 372.383580] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000640)) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 372.480972] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x0, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 372.636312] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:45 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) socket(0x11, 0xa, 0x80000001) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/schedstat\x00', 0x0, 0x0) 00:48:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 372.754466] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 372.802138] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:45 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000012800aa2010076786c616e000000040002800800000000"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00', r2) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)={0x14, r3, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r3, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x4008010}, 0x4000081) [ 372.843385] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 372.896989] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 372.932368] FAT-fs (loop1): Filesystem has been set read-only 00:48:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, 0x0) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x0, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x0, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 372.996949] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.024227] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 373.048698] nbd: must specify an index to disconnect [ 373.062323] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.090809] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.104846] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.118257] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.150718] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.174151] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:45 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x3, 'bond0\x00', {0x3}, 0x7}) [ 373.218457] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.226561] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.241829] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 373.252013] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, 0x0) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 373.335003] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.368018] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 373.377350] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.387992] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.410919] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.448005] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.475561] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:46 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xa8c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) openat(r1, &(0x7f0000000000)='./file0\x00', 0x101c02, 0x100) [ 373.495240] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.518373] audit: type=1800 audit(1617842925.983:163): pid=21188 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=247 res=0 00:48:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 373.541426] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 373.553569] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 373.637081] FAT-fs (loop4): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 373.669398] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x0, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 373.698755] audit: type=1800 audit(1617842926.163:164): pid=21206 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="/" dev="loop4" ino=248 res=0 00:48:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, 0x0) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 374.077906] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.121617] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.225794] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.235506] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.244413] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.247407] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.296681] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.362983] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.369349] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.398023] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:46 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 374.419006] FAT-fs (loop3): Filesystem has been set read-only [ 374.432835] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.432901] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.432933] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x0, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 374.432966] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.433120] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.443033] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.451430] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.501169] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.504496] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.522042] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.530924] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.537546] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.548198] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.551299] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.570341] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.589893] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.642176] audit: type=1800 audit(1617842927.103:165): pid=21263 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=249 res=0 [ 374.661896] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.706972] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.733342] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.743681] audit: type=1800 audit(1617842927.193:166): pid=21265 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="/" dev="loop0" ino=250 res=0 00:48:47 executing program 3: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000000)={0x3, 'bond0\x00', {0x3}, 0x7}) 00:48:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 374.807008] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 374.847691] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.861518] FAT-fs (loop1): Filesystem has been set read-only [ 374.871435] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.889748] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 374.903559] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 374.903879] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 374.972233] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 375.005842] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x0, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 375.017149] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 375.027388] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 375.065292] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 375.081396] audit: type=1800 audit(1617842927.553:167): pid=21304 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=251 res=0 [ 375.212217] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 375.278621] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 375.449695] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x0, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 375.532383] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 375.596745] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 375.796319] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 375.864592] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', 0x0, 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 375.993171] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.029598] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 376.057229] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.066893] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 376.089695] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 376.114766] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.126037] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:48 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 376.155399] FAT-fs (loop3): Filesystem has been set read-only [ 376.170789] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.174734] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.186729] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.190684] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.209326] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.211451] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.221839] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.229852] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.243636] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.249254] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.275066] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.285596] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.295587] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.309038] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', 0x0, 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 376.411279] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.423964] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 376.488017] audit: type=1800 audit(1617842928.953:169): pid=21399 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=253 res=0 00:48:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, 0x0, 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 376.525975] audit: type=1800 audit(1617842928.953:168): pid=21379 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=252 res=0 00:48:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 376.617087] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 376.734926] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 376.744917] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) getegid() statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', 0x0, 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x0, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 377.023653] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 377.120218] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 377.163465] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 377.235425] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, 0x0, 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 377.281694] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 377.306709] FAT-fs (loop3): Filesystem has been set read-only [ 377.346547] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 377.357862] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 377.372011] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 377.383175] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x0, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 377.402260] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) getegid() statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 377.449573] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 377.498447] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 377.519402] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 377.529162] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 377.541878] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 377.552066] audit: type=1800 audit(1617842930.013:170): pid=21455 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=254 res=0 [ 377.621530] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, 0x0, 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 377.770358] FAT-fs (loop4): bogus number of reserved sectors [ 377.777479] FAT-fs (loop4): Can't find a valid FAT filesystem [ 377.834909] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 377.924757] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 377.971333] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 377.998566] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x0, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 378.019003] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 378.042123] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.061922] FAT-fs (loop3): Filesystem has been set read-only 00:48:50 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x4) [ 378.098696] FAT-fs (loop1): Filesystem has been set read-only [ 378.136427] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.154738] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.175587] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 378.192668] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.202440] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.239040] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.239582] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.262645] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.271658] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.275657] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.293816] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.297415] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.308531] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x0, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 378.354834] FAT-fs (loop4): bogus number of reserved sectors [ 378.359749] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 378.379318] FAT-fs (loop4): Can't find a valid FAT filesystem [ 378.420813] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.431037] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.452841] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x0, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 378.467233] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 378.534423] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 378.546412] audit: type=1800 audit(1617842930.993:171): pid=21520 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=255 res=0 00:48:51 executing program 0: perf_event_open(&(0x7f00000005c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c00000010001fff0000248f1c872d2bf1b75bee", @ANYRES32=0x0, @ANYBLOB="ff7f000000000000140012800a00010076786c616e000000040002800800"], 0x3c}, 0x1, 0x8000a0ffffffff}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f00000000c0), 0x492492492492627, 0x2) [ 378.608478] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 378.611194] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174", 0xb}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x0, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:51 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) getegid() statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 378.719111] audit: type=1800 audit(1617842931.183:172): pid=21521 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=256 res=0 [ 378.848527] FAT-fs (loop4): bogus number of reserved sectors [ 378.874341] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 378.891996] FAT-fs (loop4): Can't find a valid FAT filesystem 00:48:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x0, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 379.032898] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 379.054510] FAT-fs (loop3): bogus number of reserved sectors [ 379.063847] FAT-fs (loop3): Can't find a valid FAT filesystem 00:48:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x0, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 379.190936] FAT-fs (loop0): bogus number of reserved sectors [ 379.260691] FAT-fs (loop0): Can't find a valid FAT filesystem 00:48:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 379.350473] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 379.368889] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x0, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x0, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x0, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) setgid(0x0) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 379.554842] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 379.672598] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, 0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 379.719796] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.725524] ieee802154 phy1 wpan1: encryption failed: -22 00:48:52 executing program 3 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 379.782628] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x0, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 379.869798] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 379.895659] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) setgid(0x0) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:52 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x0, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 380.167072] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 380.173509] FAULT_INJECTION: forcing a failure. [ 380.173509] name failslab, interval 1, probability 0, space 0, times 0 [ 380.176095] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 380.201075] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 380.207018] CPU: 0 PID: 21673 Comm: syz-executor.3 Not tainted 4.19.185-syzkaller #0 [ 380.217306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.226671] Call Trace: [ 380.229282] dump_stack+0x1fc/0x2ef [ 380.232932] should_fail.cold+0xa/0xf [ 380.236756] ? setup_fault_attr+0x200/0x200 [ 380.241242] ? lock_acquire+0x170/0x3c0 [ 380.245250] __should_failslab+0x115/0x180 [ 380.249668] should_failslab+0x5/0x10 [ 380.253485] __kmalloc+0x2ab/0x3c0 [ 380.257045] ? do_handle_open+0xfc/0x650 [ 380.261132] ? _copy_from_user+0xd2/0x130 [ 380.265302] do_handle_open+0xfc/0x650 [ 380.269295] ? do_sys_name_to_handle+0x480/0x480 [ 380.274079] do_syscall_64+0xf9/0x620 [ 380.277900] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.283100] RIP: 0033:0x466459 [ 380.286308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 380.305309] RSP: 002b:00007f3b4223a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 380.313054] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 380.320340] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: ffffffffffffffff [ 380.327625] RBP: 00007f3b4223a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 380.327954] FAT-fs (loop4): bogus number of FAT sectors [ 380.335040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.335049] R13: 00007ffdf11e987f R14: 00007f3b4223a300 R15: 0000000000022000 [ 380.381634] FAT-fs (loop4): Can't find a valid FAT filesystem 00:48:52 executing program 3 (fault-call:4 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:52 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x0, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, 0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 380.431103] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 380.498349] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:53 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x0, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) setgid(0x0) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 380.674960] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 380.710362] FAT-fs (loop4): bogus number of FAT sectors [ 380.729463] FAT-fs (loop4): Can't find a valid FAT filesystem [ 380.739880] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 380.772835] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:53 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x0, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, 0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 380.914883] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 380.973225] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.022889] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.054715] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 381.101466] FAT-fs (loop0): Filesystem has been set read-only [ 381.134465] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 381.243417] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 381.248208] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.265086] FAT-fs (loop4): bogus number of FAT sectors [ 381.270552] FAT-fs (loop4): Can't find a valid FAT filesystem [ 381.294270] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.317151] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.329271] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="dc01002072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 381.338992] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 381.352713] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.374804] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.392994] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.404590] FAT-fs (loop5): Filesystem has been set read-only [ 381.415294] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 381.437819] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.454430] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.471814] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.500928] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.511825] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.546225] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.547951] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.568887] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.632757] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.655548] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.714077] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.724928] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 381.726683] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.740555] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 381.773095] FAT-fs (loop4): bogus number of FAT sectors [ 381.784747] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.797342] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.808633] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.816255] FAT-fs (loop4): Can't find a valid FAT filesystem [ 381.821044] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.824385] audit: type=1800 audit(1617842934.283:173): pid=21739 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="/" dev="loop0" ino=257 res=0 00:48:54 executing program 0 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:48:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1402000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 381.889523] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 381.924161] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:54 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 381.994412] audit: type=1800 audit(1617842934.453:174): pid=21769 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=259 res=0 [ 382.027479] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:54 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x0, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 382.120802] audit: type=1800 audit(1617842934.573:175): pid=21768 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=258 res=0 [ 382.183533] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 382.217020] FAULT_INJECTION: forcing a failure. [ 382.217020] name failslab, interval 1, probability 0, space 0, times 0 [ 382.247242] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 382.344557] CPU: 0 PID: 21810 Comm: syz-executor.0 Not tainted 4.19.185-syzkaller #0 [ 382.352589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.361943] Call Trace: [ 382.364537] dump_stack+0x1fc/0x2ef [ 382.368166] should_fail.cold+0xa/0xf [ 382.371973] ? setup_fault_attr+0x200/0x200 [ 382.376303] ? lock_acquire+0x170/0x3c0 [ 382.380271] __should_failslab+0x115/0x180 [ 382.384494] should_failslab+0x5/0x10 [ 382.388280] __kmalloc+0x2ab/0x3c0 [ 382.391805] ? do_handle_open+0xfc/0x650 [ 382.395853] ? _copy_from_user+0xd2/0x130 [ 382.399986] do_handle_open+0xfc/0x650 [ 382.403871] ? do_sys_name_to_handle+0x480/0x480 [ 382.408618] ? trace_hardirqs_off_caller+0x6e/0x210 [ 382.413618] ? do_syscall_64+0x21/0x620 [ 382.417582] do_syscall_64+0xf9/0x620 [ 382.421373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.426546] RIP: 0033:0x466459 [ 382.429723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 382.448706] RSP: 002b:00007efda8ff9188 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 382.456398] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000466459 [ 382.463655] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000006 [ 382.470910] RBP: 00007efda8ff91d0 R08: 0000000000000000 R09: 0000000000000000 [ 382.478162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 382.485418] R13: 00007ffd88d76e5f R14: 00007efda8ff9300 R15: 0000000000022000 00:48:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400020072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 382.681808] FAT-fs (loop4): bogus number of FAT sectors [ 382.695809] FAT-fs (loop4): Can't find a valid FAT filesystem [ 382.707952] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 382.757438] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 382.768645] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 382.803533] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 382.853623] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 382.872797] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 382.883114] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 382.899388] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 382.910831] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 382.928497] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 382.938598] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 382.948365] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 382.963065] audit: type=1800 audit(1617842935.423:176): pid=21839 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=260 res=0 [ 382.994711] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000272"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 383.146361] FAT-fs (loop4): bogus number of FAT sectors [ 383.170065] FAT-fs (loop4): Can't find a valid FAT filesystem [ 383.212364] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 383.245735] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:55 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0), 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:55 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 383.361442] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 383.474159] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 383.517980] FAT-fs (loop4): bogus number of FAT sectors [ 383.530440] FAT-fs (loop4): Can't find a valid FAT filesystem [ 383.532962] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x2) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0), 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 383.706385] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 383.748321] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="dc01002072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 383.791076] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 383.802792] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 383.831364] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 383.858535] FAT-fs (loop5): Filesystem has been set read-only 00:48:56 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 383.937891] FAT-fs (loop4): bogus number of FAT sectors [ 383.955776] FAT-fs (loop4): Can't find a valid FAT filesystem [ 383.976197] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 384.024448] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 384.043438] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 384.059042] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 384.068907] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 384.079641] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 384.089265] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 384.098626] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 384.109358] audit: type=1800 audit(1617842936.573:177): pid=21903 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=261 res=0 00:48:56 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 384.155918] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 384.172972] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 384.196722] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0), 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x1000000) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1402000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:48:56 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 384.491486] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 384.507472] FAT-fs (loop4): bogus number of FAT sectors [ 384.513844] FAT-fs (loop4): Can't find a valid FAT filesystem [ 384.525834] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 384.639137] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 384.651709] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 384.675497] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x0, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d", 0x3, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x2000000) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400020072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:48:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:57 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x0, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 385.016931] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 385.026744] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 385.035363] FAT-fs (loop4): bogus number of FAT sectors [ 385.043212] FAT-fs (loop4): Can't find a valid FAT filesystem 00:48:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d", 0x3, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 385.249319] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 385.258044] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 385.286490] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x100000000000000) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 385.348291] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000272"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:48:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 385.433416] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 385.458680] FAT-fs (loop4): bogus number of FAT sectors [ 385.477430] FAT-fs (loop4): Can't find a valid FAT filesystem [ 385.519515] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 385.572551] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d", 0x3, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 385.651958] FAT-fs (loop5): Filesystem has been set read-only [ 385.709294] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 385.724650] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 385.775996] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 385.786057] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 385.833307] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 385.843568] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 385.868719] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x200000000000000) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 385.917248] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 385.952774] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x2) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 385.979938] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 385.998094] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.012432] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.034222] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.062672] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:58 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(0xffffffffffffffff, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 386.127766] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.134620] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.160599] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.188983] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.200669] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.205413] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.210391] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 386.225675] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:58 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x0, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 386.238063] audit: type=1800 audit(1617842938.693:178): pid=22066 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=263 res=0 [ 386.267903] FAT-fs (loop4): bogus number of FAT sectors [ 386.275656] FAT-fs (loop4): Can't find a valid FAT filesystem [ 386.280566] audit: type=1800 audit(1617842938.713:179): pid=22044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=262 res=0 00:48:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) setxattr$incfs_size(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='user.incfs.size\x00', &(0x7f0000000200), 0x8, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0xc0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1c, 0xf, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x54124a7e, 0x0, 0x0, 0x0, 0x9}, [@jmp={0x5, 0x1, 0x6, 0xa, 0x5, 0x100, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x9, 0x9, 0x9, 0x50, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0xb, 0x2, 0xb, 0x4, 0xfffffffffffffffe}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @alu={0x7, 0x1, 0xb, 0xa, 0xa, 0x6, 0x1}, @map={0x18, 0x6, 0x1, 0x0, 0x1}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x3}]}, &(0x7f0000000380)='GPL\x00', 0x20, 0xf9, &(0x7f00000003c0)=""/249, 0x20800, 0x18, [], 0x0, 0xf, r0, 0x8, &(0x7f0000000500)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0x0, 0x29, 0x2}, 0x10}, 0x78) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000600)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000980)={0x7, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x1b, 0x9, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, [@initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xffffffc1}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_val={0x18, 0x3, 0x2, 0x0, r4, 0x0, 0x0, 0x0, 0x7fffffff}]}, &(0x7f00000006c0)='GPL\x00', 0x4, 0x80, &(0x7f0000000780)=""/128, 0x40f00, 0x4, [], r3, 0x21, r0, 0x8, &(0x7f0000000800)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000840)={0x1, 0xd, 0x1, 0x7}, 0x10, r5}, 0x78) 00:48:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac", 0x5, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 386.415505] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x1000000) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 386.529825] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 386.645129] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:59 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(0xffffffffffffffff, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 386.775074] FAT-fs (loop4): bogus number of FAT sectors [ 386.780565] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 386.791169] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 386.860021] FAT-fs (loop4): Can't find a valid FAT filesystem 00:48:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x400, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r3) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) write$FUSE_ENTRY(r5, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x4, 0x0, 0x370, 0x6, 0x5b32, 0x3, {0x0, 0x3f, 0xa, 0x20, 0x800, 0x0, 0xab, 0x4, 0xa, 0x8000, 0x1, r6, r7, 0x0, 0x1f}}}, 0x90) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000580)={{}, {0x1, 0x3}, [{0x2, 0x2, r2}, {0x2, 0x1, r3}, {0x2, 0x5, r2}, {0x2, 0x4, r2}, {0x2, 0x2, r4}], {0x4, 0x5}, [{0x8, 0x0, r7}, {0x8, 0x0, r8}, {0x8, 0x6, r9}], {}, {0x20, 0x5}}, 0x64, 0x2) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:59 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x0, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac", 0x5, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 386.947607] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:48:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x2000000) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 387.053393] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 387.082788] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 387.082896] FAT-fs (loop3): bread failed, FSINFO block (sector = 1) 00:48:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e66733d6e6f7374616c655f726fa543"]) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:48:59 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:48:59 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(0xffffffffffffffff, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 387.247497] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 387.273558] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.283850] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.293342] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.304181] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.351013] FAT-fs (loop4): bogus number of FAT sectors [ 387.356793] FAT-fs (loop4): Can't find a valid FAT filesystem [ 387.370854] FAT-fs (loop5): Filesystem has been set read-only [ 387.402748] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.437332] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:48:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac", 0x5, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 387.445142] FAT-fs (loop3): Unrecognized mount option "nfs=nostale_ro¥C" or missing value [ 387.453589] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 387.475687] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 387.505008] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.519997] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.538702] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x100000000000000) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 387.553937] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.584318] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.600308] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 387.649508] FAT-fs (loop3): Unrecognized mount option "nfs=nostale_ro¥C" or missing value [ 387.685639] FAT-fs (loop1): Filesystem has been set read-only 00:49:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 387.719674] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.737700] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() sendto$unix(0xffffffffffffffff, &(0x7f0000000140)="61df1aa71667379db9fb6fd699de7ce41d9d411700b394e432ab6fc319000cab3d9f1950b581a771e85fd5861bf3637a4ea5fa34f2a359dfbdea5434664fc25eab7f8aab4ab5649bea359271531389efd4ee0f3bd17771c0efe4c48b23c88cdf7531d181ae8fa10e60", 0x69, 0x8000, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video2\x00', 0x2, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f00000003c0)={0x9a0000, 0xfffffe00, 0x7, r3, 0x0, &(0x7f0000000380)={0xd58eec, 0xe3c, [], @value64=0x400}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 387.796542] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.809213] audit: type=1800 audit(1617842940.273:180): pid=22163 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=264 res=0 [ 387.816753] FAT-fs (loop4): bogus number of FAT sectors 00:49:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x0, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 387.867979] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.905370] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 387.951542] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 387.960953] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x200000000000000) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 388.109550] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 388.139086] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.168471] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 388.188680] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:00 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x862820, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 388.222570] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.237544] FAT-fs (loop5): Filesystem has been set read-only [ 388.271699] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.273221] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.282286] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.300489] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.311017] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.332272] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 388.341387] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.360519] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.367173] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.370811] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.388873] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.398585] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.413971] audit: type=1800 audit(1617842940.883:181): pid=22233 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=266 res=0 00:49:00 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x0, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 388.414130] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.486151] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.542402] audit: type=1800 audit(1617842940.943:182): pid=22194 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=265 res=0 [ 388.575262] FAT-fs (loop4): bogus number of FAT sectors [ 388.583118] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:01 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 388.586534] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 388.713895] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.759319] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 388.762599] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.778070] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.794360] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) mount(&(0x7f0000000140)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='proc\x00', 0x18, &(0x7f0000000300)='9p\x00') r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 388.796509] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.813949] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.825121] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.840826] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.855401] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.870243] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.898128] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:01 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 388.910565] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 388.911063] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.928997] FAT-fs (loop5): Filesystem has been set read-only [ 388.943303] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.969200] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.982442] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 388.984165] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.000415] FAT-fs (loop0): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.026271] FAT-fs (loop4): bogus number of FAT sectors [ 389.031672] FAT-fs (loop4): Can't find a valid FAT filesystem [ 389.070522] FAT-fs (loop1): Filesystem has been set read-only [ 389.088377] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 389.098027] audit: type=1800 audit(1617842941.573:183): pid=22248 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="/" dev="loop0" ino=267 res=0 00:49:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x860, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="ae665b0008000000000100000000000000522c467d077c2883ec60af005f72000400"]) open_by_handle_at(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') perf_event_open(&(0x7f0000000040)={0x0, 0xffffffffffffff41, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff7ff01, 0x0, @perf_bp={&(0x7f00000001c0)}, 0x0, 0x35, 0x0, 0x2, 0x7e, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r2 = open(&(0x7f00000009c0)='./bus\x00', 0x161042, 0x4) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x6100) ftruncate(r2, 0x8200) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000880), 0x0, 0x4048884) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) [ 389.116897] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.146549] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.156878] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.157074] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.168298] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.168376] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.168391] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.168406] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:01 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='nfs=nostele_ro,\x00']) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="b700000000"], 0x0) r1 = getegid() setgid(r1) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050789ff030000880c7900000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00b8177e8000"/20, @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000800010061746d00"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x40, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x6, 0x2, [@TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x40}}, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0xb130a2194f089f48, 0x0) bind$xdp(0xffffffffffffffff, &(0x7f0000000180)={0x2c, 0x0, r5, 0x35, r6}, 0x10) [ 389.168420] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.169007] audit: type=1800 audit(1617842941.643:184): pid=22285 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=269 res=0 [ 389.246314] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 389.255899] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:01 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x0, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 389.291026] audit: type=1800 audit(1617842941.753:185): pid=22272 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=268 res=0 00:49:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 389.357812] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:01 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x0, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 389.477936] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 389.541578] FAT-fs (loop3): Unrecognized mount option "nfs=nostele_ro" or missing value 00:49:02 executing program 1: r0 = perf_event_open(0x0, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 389.608448] nla_parse: 7 callbacks suppressed [ 389.608457] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 00:49:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x28, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB='\a\x00\x00\x00r'], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) unlink(&(0x7f0000000140)='./file0\x00') [ 389.669618] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 389.697258] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. [ 389.725537] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 389.740772] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 00:49:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xff, 0x0, 0x8, 0x4, 0x0, 0x1ff, 0x54028, 0x85f5cc9d5a7dee1e, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_config_ext={0x2, 0x8f5}, 0x20, 0x523d, 0x200, 0x4, 0x835, 0xb3, 0x9794}, 0x0, 0xd, r0, 0x1) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x0, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 389.824357] FAT-fs (loop4): bogus number of FAT sectors [ 389.831300] FAT-fs (loop4): Can't find a valid FAT filesystem [ 389.930604] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x0, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 390.010943] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 390.012986] FAT-fs (loop0): bogus number of reserved sectors 00:49:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000100)=[{&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 390.082362] FAT-fs (loop0): Can't find a valid FAT filesystem [ 390.236182] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 390.282736] FAT-fs (loop4): bogus number of reserved sectors [ 390.288436] FAT-fs (loop0): bogus number of reserved sectors [ 390.289099] FAT-fs (loop4): Can't find a valid FAT filesystem [ 390.305591] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 390.323918] FAT-fs (loop0): Can't find a valid FAT filesystem 00:49:02 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x0, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 390.367769] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000100)=[{&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 390.415082] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='nfs=n`stale_ro,\x00']) open_by_handle_at(r1, &(0x7f0000004640)=ANY=[@ANYBLOB="147b0000c0ef00"], 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) sendfile(r0, r2, &(0x7f0000000140)=0x2, 0x9) r3 = getegid() setgid(r3) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) read$FUSE(r2, &(0x7f0000002600)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$ext4(&(0x7f0000002080)='ext4\x00', &(0x7f00000020c0)='./file0\x00', 0x5, 0x6, &(0x7f0000002540)=[{&(0x7f0000002100)="29a1c4b56c8e5fae2d5de26f9f6004490517912b170be38d849218c0e8ce144a452e642adcd06ba2abb7cad199dbb47936ccb865d4ae60f39b6d11bc028963055740449c54a5f273f1b8c14abe6e9b", 0x4f, 0x7ff}, {&(0x7f0000002180)="1e615c1d509df05a56d416bc27dafaa157d995dde5bc05ed00892f5027bbd4ef2563c13e4a361a71e781a8070918be1def894d103b5d01c61c728344191ad13d4b0e216782161057039a3c0e78ad91e250e9e7bb8a6a40b5e03e42066e5702e8fce9420db4ba44c2656c50320db70f8919012aa192b9f08f845c2cd4e342643e725320d7a4fe134abc82365747ce86f1fa42eae296fe608031beaf91a6ffcda43d1b3217a52292", 0xa7, 0x40}, {&(0x7f0000002240)="26723c3657f1d095804fd65dbb1ec6ed9d9934cb1aa16f6518a24920918a8536ffe5ddcb", 0x24, 0x6}, {&(0x7f0000002280)="c5d13cc5e4f6390cba020daabe9f45a1a5be825d471d7dee5852945dee9401e0ac5983a2920e0ff829338aa66d8acd003c1d63a997db3bd151c950539f295df162ffe963374b79e855e58e7038c441f2df8e7518a0fbe902096c072f2dc5d2b2dd8149e0730eb87b2e1eac687589be91dfd27b15db1f7bc663b5720bdd93bf86b45a99f30681ddf23e9b23d47c34d91dcc34da8258adfeb2a2e862a4c1429371f0f213765bc92d33addfc30b5697ebc4fcfa75bfe02d5dbe7d56403610cb2fb2830701673c2eb94d99632c3883284a6889fae226c38a9d70aca343138016773390f1347e70cff78f34264c", 0xeb, 0x5}, {&(0x7f0000002380)="a375df1a20fce6459b2612df816f6a89644ed836d9ecb98e7ff08df864e6db97bf50e6ce37967e05252c0307f0eca7d51d15711df0172aaf24e4868f58b74d3bb831d0f0f07e988938d4ac851bf8184800f12d2af4fcba1fdd9b99ce8d88cd326b8b0eee154a82319a08a6047ca7c78eee68b30e0ca50593cf0d866e096e068274bcd22ccf023a9db9e62db659a17d932623343d7c981601a6cc61b1aa7bad8f553a4adf16bbd7fba111d4066329448809c9a8bb6e3dfcd903d38c42ea9b7a08b03165e5163e6e0be18a28c81a2fde17cbb30bef4fc5419366973aab073d2a3198e4b8261674d803a4e218c26a51d6e1fccb23accdab2566e8", 0xf9, 0x1f}, {&(0x7f0000002480)="9771fa9821ed16dc57b6f0f637d65de2e7333af7a0e458e5e39515d9b6380f56491b21bc82b8ef00214ba7f58dda65648e01014f3ca098920b1b041b567fff413ce45a266e1b80ba64d566b6726c01a5cf6924bc983af89dec4ece3c8aa3cd36f01307c043d705f94c4eb9535909f84f8148fbcf4d90db58a8eca522654aeb358631fd64f799f1bea2884fb6c7892507cbe225f935c5432770fab796bee13cbeff700fcd62675546f6bfa20d7b97f28d85c4c86ba1656bd9d516f942b8", 0xbd, 0x1ad}], 0x800, &(0x7f0000004700)=ANY=[@ANYBLOB="6772706a71756f74613d2c626c6f636b7f4b8152d0646974792c6a716696da3d7666151a312c6572726f72733d636f6e74696e75652c7569643c", @ANYRESDEC=r4, @ANYBLOB="2c6673636f6e746578743d73797361646d5f752c646f6e745f68617368b124f340636c6162656c2c646f6e745ff380b461707072f76973652c636f6e743d756e636f6e66696e65645f752c646566636f6e745678743d73797374656d5f752c00"]) 00:49:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x0, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:03 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 390.673642] FAT-fs (loop4): bogus number of reserved sectors [ 390.688528] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000100)=[{&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 390.787761] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:03 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 390.868128] FAT-fs (loop0): Unrecognized mount option "nfs=n`stale_ro" or missing value [ 390.876902] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 390.899684] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 390.909432] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 390.910688] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 390.936674] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 390.945469] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 390.951740] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 390.976904] FAT-fs (loop1): Filesystem has been set read-only 00:49:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x0, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 391.053968] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.069673] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.093672] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 391.106450] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.119539] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.143073] FAT-fs (loop4): bogus number of reserved sectors [ 391.146358] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.178629] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.195951] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.202885] FAT-fs (loop4): Can't find a valid FAT filesystem [ 391.209735] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.304300] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='&\x00') mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000002080)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="ff0178f55f5a953928264b562eef454105d8b9be91d1f6f72b941053b393566d3cf928c413a48502bffb29f85bc4fa"]) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r5) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x8, 0x4e23, 0x0, 0x2, 0x20, 0xa0, 0x21, r3, r5}, {0x1, 0x1, 0x9, 0xfd, 0x3f, 0x1, 0xc0a4, 0x8}, {0x3, 0x1f, 0x3, 0x9}, 0x3, 0x6e6bb8, 0x2, 0x0, 0x1, 0x2}, {{@in=@local, 0x4d6, 0xf}, 0xa, @in=@private=0xa010102, 0x0, 0x2, 0x0, 0x7f, 0x3, 0x7}}, 0xe8) [ 391.359794] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.375973] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.397361] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{0x0}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 391.441442] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 391.449158] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.472998] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 391.492892] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.530492] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 391.562150] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x0, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 391.608876] audit: type=1800 audit(1617842944.074:186): pid=22444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=271 res=0 00:49:04 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 391.677240] audit: type=1800 audit(1617842944.124:187): pid=22438 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=270 res=0 00:49:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) r2 = getegid() mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x2a10024, &(0x7f0000000300)={[{@gid={'gid', 0x3d, r2}}], [{@euid_lt={'euid<', 0xee00}}, {@pcr={'pcr', 0x3d, 0x1}}, {@fsname={'fsname', 0x3d, '9p\x00'}}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 391.717764] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 391.829950] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 391.854478] FAT-fs (loop4): bogus number of reserved sectors [ 391.870872] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:04 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{0x0}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 392.009109] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 392.057828] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.092312] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.109201] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 392.166224] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 392.182562] FAT-fs (loop1): Filesystem has been set read-only [ 392.221975] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.249143] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="140001e9714b47f16751016d997fa3ce4875db5ac4e506c3a7100474a1c71bc74268227d1e7f5319c7661a457b256453cebd4976b333f863a19659e38d43c52f5262826dd864d06fa965513ccbaf791c462debf8dcf25a404bfb3a1250f4227ae1972fda4dfddbb01a8f2fff955a9995154a858fb4d84e7c7629959c781b132db7a340a46b7a4cd01948f6022b5037aaf517814f23f6fc0907654957a476eac23fc5578521bbcc6264f7a8651d63"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x8200, 0x0) ioctl$VFIO_GET_API_VERSION(r2, 0x3b64) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) r3 = getgid() pipe(&(0x7f0000000180)={0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) write$FUSE_ENTRY(r4, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x4, 0x0, 0x370, 0x6, 0x5b32, 0x3, {0x0, 0x3f, 0xa, 0x20, 0x800, 0x0, 0xab, 0x4, 0xa, 0x8000, 0x1, r5, r6, 0x0, 0x1f}}}, 0x90) r7 = getgid() setxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x7}, [{0x2, 0x1, 0xee00}, {0x2, 0x1}], {0x4, 0x2}, [{0x8, 0x7c38834efbc70d84}, {0x8, 0x4, r3}, {0x8, 0x4, r6}, {0x8, 0x2, r7}, {0x8, 0x4, r1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x3) 00:49:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x0, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 392.271100] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.302544] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x800, 0x0) write$binfmt_elf32(r2, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x8, 0x0, 0x7, 0xfffffffffffff80e, 0x3, 0x3, 0x4, 0x21f, 0x38, 0x6, 0x5a1518f5, 0x800, 0x20, 0x2, 0x100, 0x1ff, 0xbf}, [{0x3, 0x2, 0x4, 0x10000, 0x7fff, 0x2, 0xdf08, 0xffffffc1}, {0x6, 0x0, 0x9, 0x3f, 0x8b8, 0x9a06, 0x2, 0x6}], "6d5265d4c402ae776298cd266435b2c395f767ad34dd6e", [[], [], [], [], []]}, 0x58f) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="2c80"]) lseek(0xffffffffffffffff, 0x1, 0x0) [ 392.317895] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.332008] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.335779] FAT-fs (loop4): bogus number of reserved sectors [ 392.348304] FAT-fs (loop5): Filesystem has been set read-only [ 392.356855] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.374112] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.391478] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.402405] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.409602] FAT-fs (loop4): Can't find a valid FAT filesystem [ 392.416632] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.428965] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.447307] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.459959] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.476503] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.489394] FAT-fs (loop1): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.501361] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.503485] audit: type=1800 audit(1617842944.974:188): pid=22517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="loop1" ino=272 res=0 00:49:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{0x0}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 392.551274] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 392.590906] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) rename(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='./file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r1) syz_mount_image$msdos(&(0x7f0000000380)='msdos\x00', &(0x7f0000000400)='./file0\x00', 0x3, 0x1, &(0x7f0000000440)=[{&(0x7f0000000880)="05b21de1ce12d0841f3f06b0780c5bf4b94a63e74f0341e65b1d67c3c03263271b59635a517d1bc6ced77f4fb0c91bd65af639060bb874ace5d02db7773641fd121fed6d50ebac45af336494e4ce268347341301580301", 0x57, 0xfffffffffffffffd}], 0x20, &(0x7f0000000900)={[{@dots='dots'}, {@dots='dots'}, {@fat=@uid={'uid', 0x3d, r1}}, {@fat=@tz_utc='tz=UTC'}, {@fat=@debug='debug'}], [{@euid_lt={'euid<', 0xee00}}]}) r2 = getegid() setgid(r2) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) setresgid(r3, 0xee01, r3) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="a2a8b1a234ab39822af82c00"]) r4 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@mcast1, @in=@initdev}}, {{@in=@private}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 392.680174] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 392.686795] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x0, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 392.742998] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 392.772948] audit: type=1800 audit(1617842945.234:189): pid=22532 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=273 res=0 00:49:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r3 = getegid() setgid(r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002080)='/dev/dlm_plock\x00', 0x400c00, 0x0) connect$inet(r4, &(0x7f00000020c0)={0x2, 0x4e23, @multicast1}, 0x10) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 392.897370] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 392.907993] FAT-fs (loop4): bogus number of reserved sectors [ 392.922717] FAT-fs (loop4): Can't find a valid FAT filesystem [ 393.018116] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 393.053260] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 393.077669] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 393.099927] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 393.105391] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:05 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 393.119457] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 393.130358] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 393.140610] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 393.151751] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 393.167442] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 393.186398] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 393.199445] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 393.212389] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:05 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x0, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 393.231014] audit: type=1800 audit(1617842945.694:190): pid=22583 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=274 res=0 00:49:05 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x0, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 393.432916] FAT-fs (loop4): bogus number of reserved sectors [ 393.439533] FAT-fs (loop4): Can't find a valid FAT filesystem [ 393.487912] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 393.516026] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 393.540142] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 393.600099] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x0, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 393.665296] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x0, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffa, 0xd0100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9da2, 0x0, 0x0, 0x5}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x3) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) pipe(&(0x7f0000000180)={0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) write$FUSE_ENTRY(r2, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x4, 0x0, 0x370, 0x6, 0x5b32, 0x3, {0x0, 0x3f, 0xa, 0x20, 0x800, 0x0, 0xab, 0x4, 0xa, 0x8000, 0x1, r3, r4, 0x0, 0x1f}}}, 0x90) setgid(r4) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 393.834369] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)={0x3, 0x6c8, 0x5, 0x0, 0xfffffff9, 0x1000000}) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:49:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 393.882834] FAT-fs (loop4): bogus number of reserved sectors [ 393.909942] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 394.027606] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 394.075260] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00', 0xffffffffffffffff) setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:06 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x0, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 394.222810] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 394.224821] FAT-fs (loop4): bogus number of reserved sectors [ 394.283471] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x0, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 394.320750] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f0000001280)="dbede220da031950e8d242c027229e8b0e291d56e928c5021851daf41fe54f3d8b441553db5f5c186a17be722a39cd8dc7dc18ea56a5ec0c99c287909b5a44e9c02eb92991b7df1bdecb8fbc4b2c5c59c1610c0003ce93fa7cf6c3e4e68448161473aa8a834e3ac81e2472a3d5085f655cac3ab13078cddd272491ea981edb548773f1a1967824a1146aff60f6e8a9c42893af029a3f24adff06f0dd90fcc3c12df45dcc75f470c32a15d4a9fdd6b36d3020dc45d3a25f944f3da62d194eb6c7fb9b8792a9e1001717a4dc8a7427f309f59c8611202077e03f365bbcb02e2c9cfc5e", 0xe2, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) r1 = syz_open_dev$vcsn(&(0x7f0000000600)='/dev/vcs#\x00', 0x65, 0x200000) recvmsg$can_raw(r1, &(0x7f0000001240)={&(0x7f0000000dc0)=@caif, 0x80, &(0x7f0000001140)=[{&(0x7f0000000e40)}, {&(0x7f0000000e80)=""/145, 0x91}, {&(0x7f0000000f40)=""/112, 0x70}, {&(0x7f0000000fc0)}, {&(0x7f0000001000)=""/40, 0x28}, {&(0x7f0000001040)=""/21, 0x15}, {&(0x7f0000001080)=""/170, 0xaa}], 0x7, &(0x7f00000011c0)=""/77, 0x4d}, 0x0) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000bc0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="9ae7"]) syz_mount_image$f2fs(&(0x7f0000000140)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x8, &(0x7f0000000b00)=[{&(0x7f0000000500)="357b89f83b8ef3665a441a262369f969ff3a60ce82332de3b2d4a794655966e822e633021fd186c4e9c5f9c2d7013501423c667f4d249a01aabb4f35618491be841e281988785db286293d37712d6c28c5a8b9391d84bd039cff8a6a3f3c5d33cd8600217dc0dd8f3fdcfa7c6af71d872c225af1e7e0560cea99501c2d14ab6422bde74e7794add2d4dc3454067c1b8b9e251669fdfb7ddc0a9dd189dd504217fdc0ce0fa325161e839ed5a4635921158d22d7aea744f569ca97bb5791db6ea1db4bfbcd86b01cd71f23f15c5c2cb611", 0xd0, 0x80000001}, {&(0x7f0000000400)="f31f1615cdbc78746a3e3bc95715f17441b5d534ea568149756a7c9437e5dce4b4247ceb01f4c8cfd61ae9f8b6a2717f1d88bb80c0b14d28bb2f3a1d0de2d851b22a219aeba9d22fd340d15e0705423c2249480d4cf79a5d87fb8afa468193b1f05383bb65eb78cb7057e8399b41ef733871", 0x72, 0x200000003ff}, {&(0x7f0000000200)="441db297db9d1a9fab66cd149abdf51de4004dcc7c1d7895e26d59f2ab36f025b5bc9645fdd741", 0x27, 0x5}, {&(0x7f0000000780)="1d2bee89fbafe1f210c60fefa34d6ef4d48fb9ff13b1c0c3bda59e7ad4fd7bf6d4cecfd45aca219cbc948a5bdd5e323a372b15d801a995b9741feec23719754729319bcc706d19638819266c00ba6845b18630c5af4c7809346aa70b6546d4e005918aa463035e56f3a1729e4e535cd9cd549ddcc18de53c588e737e6f676b713448acfb113cf08c8c70a46fdeb14bac65b01326a2ab096f8af56895dd39d29a9b25f6941b4718aa0a71de2b8b45d2f53018b786efd55a98e5e463e65a6184dc47dc59038bd6ffb844f767b67b028fe727650b26c887b838ed1897e8b0c232fdc7e4b537840ddbf6c43d08a4cfcc4ffa8b7850", 0xf3}, {&(0x7f0000000880)="ee48567bd9df380ff63c81800bf69a194ea056a78376736b50888ba66b3128724ba0ad286c970e5c0717b299dbfefa2ed20ba29aa63530f2538cd8f6c9ab07fcd1e88eabe4335cb4ebf36740858f36de170c49643ccf381111f2d95a066a80b62ed2d122785094291add988429ac5e3ae7c297046beb49028c08816ea130dfd1f2b5b54b142ae8707ab3fa452cbae0bbe79593fc894320db8da264dbd3ace31d4c1210bafc4779ec602ffec1cffbcbe6211ea6db96ddd96e7dba5a8e3b38c1203f9aa400b01030fa70cc7863160f6e1acfba68a4d6ee59dc133fe06f8b", 0xdd, 0x8000000000000002}, {&(0x7f0000000680)="d9a9d1201cad9747a441f36dd84936d97d6137e5f1980fd5c005175e29b276fe9f90ccea7f56552022ea6cbf2ae6e2b303d569335578d032705f79567e39192117da5fad079178fededd", 0x4a, 0x7fff}, {&(0x7f0000000980)="527abaae8e37f59ea594a0203c589b5214f2a05955134141e9692adb3ae1d459127081396518c7dda1347b5359585afb269a0da1bb4d16308fa5d21f3f174cdf4e292e8f5948e651fdb4bcbf12fa40b919d7e6d2a20b5dc56a2cd013e8864b56fd487b5c90fea0dacf7d1fae0863b374bba8fd0f7e3e5bc6098a4ccd79ffaecdaab2107b76cb036573f287657bbc9c6e6412e1bdb9e02fda33bf8dee01d97d64cdd631595d9f6f9ee1983e21d4160a3705d7257bd1fb1795d99fd70ccaf6", 0xbe, 0x4}, {&(0x7f0000000a40)="b72f365b03b682087319872e7a0ddf2880ca77f68ab4f748f3d0a983706e2bb0b807cfd0a5854767904bb1c337e14ecfeab556e10cf93ca9093f406ad3cf193037cbf54491039a891ebffa7489fec78a84fb33a64a636c6f37e414a327d6a0fa79c41e3032bfa6b5191ae4504ef102445cb2e02b428a22d7d0cbc54baf25b30dec75887c3052fa8bd725a9e765dcc86a5842152308575766482b320ca6b0dd9b4e", 0xa1, 0x283}], 0x0, &(0x7f0000001380)={[{@nodiscard='nodiscard'}], [{@obj_type={'obj_type', 0x3d, '@&'}}, {@dont_measure='dont_measure'}, {@audit='audit'}, {@measure='measure'}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor'}}]}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 394.436834] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 394.504278] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 394.521107] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 394.534219] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000880)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0x1e8, 0x140, 0xffffffff, 0xffffffff, 0x2a8, 0x2a8, 0x2a8, 0xffffffff, 0x4, &(0x7f0000000140), {[{{@uncond, 0x0, 0xe0, 0x140, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x40, 0x3a4, 0x0, 0x1}}, @common=@set={{0x40, 'set\x00'}, {{0x4, [0x3, 0x6, 0x0, 0x0, 0x0, 0x1], 0x0, 0x2}}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x3, [0x9, 0x6, 0x4, 0x7, 0x3, 0x2], 0x6, 0x1}, {0xffffffffffffffff, [0x5, 0x0, 0x0, 0x3, 0x5], 0x6, 0x6}}}}, {{@uncond, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x2, 0x1, 0x3}, {0x2, 0x3, 0x2}, {0x4, 0x0, 0x5}, 0x7, 0x1000}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@ttl={{0x28, 'ttl\x00'}, {0x3, 0x1}}]}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x3}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a0) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 394.548745] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174", 0xb}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x0, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 394.588317] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 394.633925] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 394.675859] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 394.686961] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 394.709303] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 7465) 00:49:07 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x0, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 394.717897] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 394.718030] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 394.718064] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 394.718096] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 394.749866] audit: type=1800 audit(1617842947.184:191): pid=22705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=275 res=0 [ 394.759810] FAT-fs (loop3): count of clusters too big (1343816446) [ 394.796732] FAT-fs (loop3): Can't find a valid FAT filesystem [ 394.814620] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 394.817915] FAT-fs (loop4): bogus number of reserved sectors [ 394.844727] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 394.889661] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174", 0xb}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 395.018513] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 395.041070] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 7465) [ 395.051145] FAT-fs (loop3): count of clusters too big (1343816446) [ 395.058078] FAT-fs (loop3): Can't find a valid FAT filesystem 00:49:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x602a4ec69502d862, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1400000072f4b43b09bceab100879ccaaa54a6f49348a2d5e0fea0147cd303939a8d268fc8a5dc0811afc81b6baed52b1611a007aa4430609d3c3b2c5c98a533efdbb4a334d819b3a7cc50719494"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:49:07 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x0, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 395.064127] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x5, 0x8, 0xb, 0x3, 0x0, 0x53a, 0x400, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x401, 0x4, @perf_bp={&(0x7f0000000180), 0x8}, 0xd20c, 0x1ff, 0x8, 0x5, 0x87e, 0x80}, r1, 0xffffffffffffffff, r0, 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) acct(&(0x7f0000000140)='./file0\x00') open_by_handle_at(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r3 = getegid() setgid(r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="2c0039dda3c4fbbcf0927c4f2aa52171fc2c8c2c8e0573169458bdd601c17140e03d190ba85d7bcc17c7cfa1894efa17a564840adbfcce9a633be9b185e782376c2bbd936a091954fd4aedb95534"]) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:07 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x0, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 395.216133] FAT-fs (loop4): bogus number of reserved sectors [ 395.222049] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174", 0xb}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 395.368378] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 395.379931] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 395.570170] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000880)={0x2020, 0x0, 0x0, 0x0}, 0x2020) mount$overlay(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='overlay\x00', 0x2000, &(0x7f0000000340)={[{@metacopy_off='metacopy=off'}, {@nfs_export_on='nfs_export=on'}], [{@euid_lt={'euid<', 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, '\x14{'}}, {@seclabel='seclabel'}, {@fowner_lt={'fowner<', r2}}]}) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:49:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xb2, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p20,access=\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000140)={0x1fe00000000000, 0x87e, 0x1, 0x40, 0x2, [0x4, 0x9, 0x1000, 0x7ac]}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 395.610717] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x0, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x0, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 395.740787] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 395.750214] FAT-fs (loop4): bogus number of reserved sectors [ 395.764580] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 395.887406] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 395.917355] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 395.929236] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a02", 0x11}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=0x1c, 0x800) sendfile(r2, r0, &(0x7f0000000200)=0x1, 0x40) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) chown(&(0x7f0000000200)='./file0\x00', 0xee00, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x20400, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000003c0)={0x4, 0x70, 0x9, 0x0, 0x61, 0x0, 0x0, 0xb4, 0x82, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffff000, 0x4, @perf_config_ext={0x7f, 0xaee}, 0x4022, 0xf1bf, 0x3, 0x5, 0x7, 0x400, 0xc267}) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x3, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcsa\x00', 0x120001, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000440)='/dev/input/mouse#\x00', 0x780, 0x480000) setsockopt$inet_tcp_int(r3, 0x6, 0x7, &(0x7f0000000480)=0xfffffffa, 0x4) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)) [ 396.202144] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 396.241467] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 396.256364] FAT-fs (loop4): invalid media value (0x00) [ 396.273624] FAT-fs (loop4): Can't find a valid FAT filesystem [ 396.295581] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:08 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x0, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a02", 0x11}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:08 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 396.408803] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 396.475323] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 396.492848] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 396.497756] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:09 executing program 3: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000002300)=@delchain={0x200, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff4}, {0x0, 0xffff}}, [@filter_kind_options=@f_fw={{0x7, 0x1, 'fw\x00'}, {0x1d4, 0x2, [@TCA_FW_POLICE={0x10, 0x2, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7}]}, @TCA_FW_POLICE={0x20, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x80000000}, @TCA_POLICE_RESULT={0x8, 0x5, 0x9}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x20}]}, @TCA_FW_ACT={0x17c, 0x4, [@m_skbmod={0xd0, 0x6, 0x0, 0x0, {{0xb, 0x1, 'skbmod\x00'}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBMOD_DMAC={0xa, 0x3, @multicast}, @TCA_SKBMOD_DMAC={0xa, 0x3, @multicast}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={[], 0x32}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x12e}]}, {0x69, 0x6, "41382cc5d13f560f8c2b6eaa05ac8261c1a95d499e6462c546cf26274069b02dc72f90edd4983c42d70f34702d4f11f7b00e2c454e05dbdf4cd558739ace842e19e885b93f9f29b2e4db61607b7c8444b5f7ed2f4cab2db88add76e1688ea6c5341b85f84f"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3}}}}, @m_mpls={0xa8, 0x6, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_TTL={0x5, 0x7, 0x7}]}, {0x72, 0x6, "43f93d5bc67fa6da62801143bf90e1959dbf5ae62fe4b36105145819072084a90c0fbbf70336c0e532bbd646ab13cd0ad88d626501a74d795da3e0ab4b32c7bcc95322b3a051ab4dd3e4935948e4e004bfbab96973e03ed8831feb706d426315933f2b823f885f17092534c45506"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_FW_CLASSID={0x8, 0x1, {0x10, 0xfff1}}, @TCA_FW_INDEV={0x14, 0x3, 'macvtap0\x00'}, @TCA_FW_MASK={0x8, 0x5, 0x20}]}}]}, 0x200}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000022c0)={&(0x7f00000021c0)={0x10, 0x0, 0x0, 0xf7750184ec018b2e}, 0xc, &(0x7f0000002280)={&(0x7f0000002200)=ANY=[@ANYBLOB="440000002e00000128bd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0700040000000f000100ffff08000b0004000008000b000800000008000b00fd0300"/44], 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0xb5}, 0x9db0, 0xb, 0x0, 0x6}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000002180)=ANY=[@ANYBLOB="6e00000000000000000000008e9eca992d3363cd8bf9b5f8ebbc2b00000000"]) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) perf_event_open(&(0x7f0000002100)={0x5, 0x70, 0x2, 0x8, 0x7, 0x3f, 0x0, 0x101, 0x200, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000020c0)}, 0x40, 0x1ff, 0x7, 0x2, 0x80, 0x9}, r2, 0xc, r0, 0x9) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r3 = getegid() setgid(r3) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000002080)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@cache_mmap='cache=mmap'}]}}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) faccessat(r4, &(0x7f0000000140)='./file0\x00', 0x182) lseek(0xffffffffffffffff, 0x1, 0x0) [ 396.612243] FAT-fs (loop4): invalid media value (0x00) [ 396.612639] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 396.628066] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f0000002080)=ANY=[@ANYBLOB="a1253abc08181b"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)=ANY=[@ANYBLOB="7472616e733d757969782c706f736978614b6c2c766588594672fd7273696f6e3d3970323000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lseek(0xffffffffffffffff, 0x1, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) sendfile(r3, r0, &(0x7f0000000140)=0xffffffffffffff00, 0x80000000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 396.696178] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 396.708346] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 396.718114] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 396.728840] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 396.740236] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 396.754065] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 396.787212] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 396.802397] FAT-fs (loop3): Unrecognized mount option "n" or missing value [ 396.838830] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 396.858974] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a02", 0x11}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 396.890137] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 396.905164] FAT-fs (loop5): Filesystem has been set read-only [ 396.968374] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 396.973021] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:09 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000}, 0x9db0, 0x0, 0x0, 0x6}, r0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) symlinkat(&(0x7f0000000400)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000440)='./file0\x00') r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e62733de0d57374616c4000726f2c00"]) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setreuid(0x0, r3) pipe(&(0x7f0000000180)={0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(0xffffffffffffffff, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x4, 0x0, 0x370, 0x6, 0x5b32, 0x3, {0x0, 0x3f, 0xa, 0x20, 0x800, 0x0, 0xab, 0x4, 0xa, 0x8000, 0x1, 0x0, 0x0, 0x0, 0x1f}}}, 0x90) setresgid(0x0, r2, r2) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) write$FUSE_ENTRY(r4, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x4, 0x0, 0x370, 0x6, 0x5b32, 0x1, {0x0, 0x3f, 0xa, 0x20, 0x800, 0x0, 0xab, 0x4, 0xa, 0x8000, 0x1, r5, r6, 0x0, 0x1f}}}, 0x90) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000140)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 397.074472] audit: type=1800 audit(1617842949.534:192): pid=22870 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=276 res=0 [ 397.086677] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 397.136165] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 397.146121] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 397.162964] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 397.179468] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 397.192629] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 397.212322] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 397.222070] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:09 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x0, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x9, 0x3, 0x2e8, 0x108, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x218, 0xffffffff, 0xffffffff, 0x218, 0xffffffff, 0x3, &(0x7f0000000140), {[{{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@common=@eui64={{0x28, 'eui64\x00'}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0x0, 0x5}, {0x2, 0x4, 0x1}, {0x4, 0x2, 0x4}, 0x5, 0x2}}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x1, 0x4c5d, 0x7fff, 0x8, 'snmp\x00', 'syz0\x00', {0x9}}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 397.243127] FAT-fs (loop4): invalid media value (0x00) [ 397.248462] FAT-fs (loop4): Can't find a valid FAT filesystem [ 397.255555] audit: type=1800 audit(1617842949.714:193): pid=22891 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=277 res=0 [ 397.380345] FAT-fs (loop3): Unrecognized mount option "nbs=àÕstal@" or missing value 00:49:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a02000274", 0x14}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 397.442123] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e66503f6e6f737461ff0f00006f2c00"]) open_by_handle_at(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1400000072da77ebf0c7b6af01167ec3e43b83b6142dd4353b370cea22ddd19bc85205642b233126a06e85b5c2a131b3d447368889c7f847190f409082c4c1f9c357f548d986ae404b314861c96be87703776c50fdd0794a39a63636a244d865e3f0daf42a8577960ee32c32389731"], 0x0) r2 = getegid() bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r0, 0x10, &(0x7f0000000300)={&(0x7f00000001c0)=""/90, 0x5a}}, 0x10) setgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_atm={0x8, 0x1, 'atm\x00'}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x40, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0x0, 0xffff}}, [@filter_kind_options=@f_matchall={{0xd, 0x1, 'matchall\x00'}, {0x6, 0x2, [@TCA_MATCHALL_CLASSID={0x8}]}}]}, 0x40}}, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000004540)={&(0x7f0000002a80)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000004500)={&(0x7f0000002ac0)=@newchain={0x1a2c, 0x64, 0x300, 0x70bd2d, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x3, 0xb}, {0x2, 0xa}, {0x0, 0xf}}, [@filter_kind_options=@f_tcindex={{0xc, 0x1, 'tcindex\x00'}, {0xc, 0x2, [@TCA_TCINDEX_HASH={0x8, 0x1, 0xb90d}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x8}}, @TCA_RATE={0x6, 0x5, {0x81, 0x1}}, @filter_kind_options=@f_rsvp6={{0xa, 0x1, 'rsvp6\x00'}, {0x19b4, 0x2, [@TCA_RSVP_PINFO={0x20, 0x4, {{0x9, 0x22, 0x10001}, {0x0, 0x6, 0x5c3}, 0x0, 0x9, 0x5}}, @TCA_RSVP_SRC={0x14, 0x3, @remote}, @TCA_RSVP_POLICE={0x42c, 0x5, [@TCA_POLICE_AVRATE={0x8, 0x4, 0xffffffff}, @TCA_POLICE_RESULT={0x8, 0x5, 0x9}, @TCA_POLICE_RATE64={0xc, 0x8, 0x4}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xd094}, @TCA_POLICE_RATE={0x404, 0x2, [0x2, 0xffffffff, 0x3, 0x7fff800, 0x7fffffff, 0x1000, 0x7, 0x3, 0xfffffff7, 0x81, 0x0, 0x6, 0x8000, 0x7ff, 0x7, 0x1, 0xb1, 0x84d, 0x2, 0x7fff, 0xfffffff8, 0x0, 0x4, 0x5, 0xfffff000, 0x8, 0x2, 0x4, 0x1865, 0x200, 0x100, 0x7ff, 0x80, 0x3, 0x8, 0x7fffffff, 0x7, 0x8, 0xffffb801, 0x9, 0x1, 0x5, 0x4, 0x7, 0x63f, 0x90, 0x6, 0xffff, 0x1, 0x7, 0x8, 0x800, 0x1ff, 0xc4, 0x4, 0x6817, 0x0, 0x64, 0x0, 0x3, 0x9, 0x1000, 0xff, 0x2, 0xf809, 0x247, 0x94, 0x8, 0x9, 0x7f, 0xfb5b, 0x8001, 0xc5, 0xffff7cf3, 0x2, 0x2, 0x5, 0xcd91, 0x6, 0x0, 0x7, 0x6, 0x8, 0x8, 0x8001, 0x9, 0x80, 0xc9f, 0x3, 0x4, 0xaeb, 0x6, 0x1f, 0x2, 0x3f, 0x4dc7, 0x400, 0xb5, 0x6, 0x80000000, 0x6, 0x7f, 0x4, 0x1, 0x8, 0x20, 0x3, 0x40000000, 0x3, 0x8, 0xfffffff9, 0xfffffffd, 0x1, 0x0, 0x3, 0x30ec, 0x3, 0x101, 0x4, 0x8001, 0xffff, 0x40, 0x4, 0x3, 0x100, 0x9, 0x5, 0x0, 0xfffffffc, 0x7fffffff, 0x100, 0x1, 0x6, 0x20, 0x0, 0x0, 0xfec1, 0x1, 0x5, 0x10000, 0x5, 0x2d8c, 0x2ab, 0x7, 0x0, 0x7, 0x1, 0x1a08, 0x3, 0x9, 0x9a9, 0x2, 0x4, 0x4, 0x0, 0x20, 0x7, 0x99, 0x5be3, 0x3f, 0x0, 0x1, 0x4, 0x8, 0x4, 0xff, 0x7, 0x80000001, 0x3, 0xfffffffa, 0x8, 0x0, 0x3, 0x3, 0xffff, 0x4, 0x7, 0x3, 0x4, 0x7ff, 0x20, 0x7, 0xfaa, 0x4, 0xddb4, 0x2, 0xffff0000, 0x1, 0x3f, 0x4, 0x401, 0x3, 0x3f, 0x0, 0x8, 0xffffffff, 0x851, 0x608a7ee5, 0x2, 0xfffffffe, 0x5, 0x4, 0x100, 0x0, 0x4, 0xfffffffe, 0x1f, 0x7, 0x4, 0x8001, 0x4, 0x9, 0x5, 0x1, 0x0, 0x7f, 0x4, 0x800, 0x9a5, 0x80, 0x6, 0xbdd, 0x0, 0x0, 0x1, 0x800, 0x0, 0x80, 0x1, 0x3f, 0x7ff, 0x0, 0xfff, 0x3, 0x3, 0x0, 0xa0f9, 0x4, 0x5, 0x7f, 0x8, 0x9, 0x8000, 0xc4d, 0x8000, 0x1e24, 0x1f, 0x0, 0xfffff001, 0x54af, 0xcad9, 0x7, 0x7ff, 0x9, 0x4, 0x193f]}]}, @TCA_RSVP_ACT={0x1548, 0x6, [@m_bpf={0x184, 0x5, 0x0, 0x0, {{0x8, 0x1, 'bpf\x00'}, {0x68, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x8, 0x7ad1, 0x6, 0x1, 0x1}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x67, 0xffffb2a6, 0x5, 0x5, 0x7}}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_FD={0x8, 0x5, r3}, @TCA_ACT_BPF_FD={0x8, 0x5, r1}]}, {0xf7, 0x6, "58d85ef2eecae09f9e51ff2972ef103cabcce11882c680ee5920e0b0dd439cedc6feb6f3cf8688af2ad3d2d28b5f51aad34f4cd2b06e59ad89ab97abe112d42b5787a857d6f748b93d89307c6aa799310dd4fdf23f682e726c5c67275b1b4fed48f96eb9810f27049558622ded368a8583391c17ab5ea544ba0f8b15ff7ae6b2e2fdef64ab13dc785c987b370a2e0d4b829b4aad87d9a81d8ade121d7b4de443c2a59637c09bbbaec3fbe09dcaa239267c763f95ab63fa7876e4ffa1069f8a516a3507b98eb44545f2f18a7437da75d62f5d5eed2b9046806611843f1c118462a507ed2b275fa7a21e150dbbd0fd8c7bda1661"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_ctinfo={0x84, 0x1b, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ZONE={0x6, 0x4, 0x536}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x80000001}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x5}, @TCA_CTINFO_ACT={0x18, 0x3, {0xfffff558, 0xfffffff8, 0x2, 0x0, 0x52d3111a}}]}, {0x1f, 0x6, "87e963892aa889a7e55588c1f8fb0346b5c85d33e771c07ff6dfa2"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_vlan={0x120, 0x9, 0x0, 0x0, {{0x9, 0x1, 'vlan\x00'}, {0x30, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x68c}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x3e8, 0x1, 0x3, 0x1, 0x8000}, 0x1}}]}, {0xc6, 0x6, "25893dcd884b39df20b087f500f0b7023c38035d3ac7d10f893029f3a12b4791f852fc9ba4de0751ae15f6cb113b00f0b62b98ea5b89c6f202314eed81138c259b8f55fe77da0091d4710238eea0219e46ec548099c94ca4c1c9a1ee149fc5afb115ed317fea5a72f4e1666f4fba6ba9887786754a42dd2e7fc65b38af5bda17e3546f01206dda0dd8710c4f058abd6909383368d3af5b3ff1f3b8d6897d457b026cb36a9006f55e4fe3995155b8c8954bc7a5329456937942731b16cbd22de8db9a"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_csum={0x1fc, 0x12, 0x0, 0x0, {{0x9, 0x1, 'csum\x00'}, {0x100, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x4, 0x9, 0x2, 0x3, 0xea2}, 0x17}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x0, 0x20000000, 0x7, 0x1}, 0x32}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xee, 0xffffffff, 0x4, 0x7fffffff, 0x2d61}, 0x26}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xc1c2, 0x8001, 0x4, 0x7fff, 0x9}, 0x19}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x4, 0xffffffffffffffff, 0x9}, 0x5e}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x0, 0x3f, 0x0, 0x4, 0x101}, 0x3e}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1f, 0x3f, 0x2, 0xa02d, 0xfff}, 0x6f}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x2, 0x4, 0xffffffffffffffff, 0x0, 0x800}, 0x24}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x1ff, 0x400, 0xffffffffffffffff, 0x0, 0x4}, 0x21}}]}, {0xd4, 0x6, "b9a11c7e004bf152f93f849b17bfe94a161534558a42712b7ab421f28f35355f9f04d087f2debc76333183f37bccdd046831085192a98f6c490b4a930236d9c1771354404b282c5fe2cce2b90fada60e9bd630d20547748a1050193ed74a10a8f0dc7775ed9d1dfda5b100779223b2d39d78d465fe389a1b46c9ba71ef5aa27638f673b76d9d8e2c22b2d5023bdfdf216181fd448bd8423152ca652fcb1b5821400777628a57619204765b6485001b8b3f293d3243027b09332d7ac8d0a7efc722a407d47c3808de4376b98044e906d8"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_mpls={0x98, 0x6, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5, 0x6, 0x6}, @TCA_MPLS_TC={0x5, 0x6, 0x2}, @TCA_MPLS_TTL={0x5, 0x7, 0x6}, @TCA_MPLS_TTL={0x5, 0x7, 0x3}, @TCA_MPLS_BOS={0x5}, @TCA_MPLS_PROTO={0x6, 0x4, 0x88ca}]}, {0x3b, 0x6, "a98f2ba3c241eb2fe7f052220a35b26922c50c0ef3cea3139adc004e473647437b65f679683a40266bfeda1115521e371cdcb8b99c543a"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_police={0xd4c, 0xf, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0xcf0, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x9, 0x6, 0xd4f, 0x81, 0x80000000, 0xe76d, 0xffff, 0x100, 0x200, 0x1, 0x6e4a, 0x5, 0x2, 0xfb000000, 0x2d544748, 0x20, 0xffffffff, 0x4, 0x2, 0x100, 0xe5, 0x5, 0x140, 0x7000, 0x3ff, 0x7fffffff, 0xee, 0x8, 0x3, 0xc2b, 0x5, 0x9, 0x101, 0x7, 0x9, 0xfff, 0x401, 0x0, 0xffffff00, 0xc4de, 0x3, 0x0, 0x4, 0x8, 0x3f, 0x5, 0x101, 0x8, 0x400, 0x0, 0x400, 0x80, 0xd27, 0x315, 0x6, 0x8001, 0x3, 0x8, 0x6, 0x1, 0x8, 0x80000001, 0x3, 0x6, 0x1, 0x6, 0x6, 0x87, 0x23f4, 0x1, 0x81, 0x14, 0x7ff, 0x7ff, 0x0, 0x80, 0x8, 0xffffffff, 0x3ff, 0x20, 0x6, 0xffffffff, 0x7, 0x9, 0x9, 0x7, 0x7, 0xde01, 0x8000, 0x51, 0x0, 0x6, 0x0, 0x14, 0x20, 0xd1, 0xc2, 0x82d2, 0x2, 0xfff, 0x8, 0x2, 0xff, 0x597, 0x1, 0x8, 0xfffffff9, 0x4, 0x8, 0x9, 0x5, 0x7fff, 0x0, 0x7f, 0x4, 0xe9d, 0x3, 0x7ff, 0x6, 0x5, 0x20, 0x3, 0x6, 0x8, 0x1ff, 0x4, 0x1, 0x7, 0x401, 0x80000000, 0x6, 0x6, 0x401, 0xbd, 0x2, 0x4, 0x3, 0xd0d, 0x5fff, 0x7ff, 0x7, 0xa33c00, 0x3, 0x0, 0x799, 0x7, 0x1, 0x0, 0x4, 0x4, 0x101, 0x1000, 0x7, 0x8, 0x200, 0x62, 0x0, 0x4, 0x9, 0x1, 0x299a6a4c, 0x0, 0x1, 0x7d78cd01, 0x7, 0x8000, 0x8456, 0x4, 0x7fffffff, 0x2, 0x1b9, 0x4dd, 0x63, 0x5, 0x2, 0x0, 0x1, 0x5, 0x1bc, 0x9, 0xffff, 0x4, 0xffff0001, 0x8001, 0x1, 0x4, 0x8, 0x19e00, 0x9, 0x2, 0x30d, 0x9, 0x4, 0x5, 0xcb, 0x10000, 0x3, 0x8, 0x8, 0x9, 0x10001, 0x100, 0xf2c, 0xc2, 0x4, 0x4, 0x1000, 0x3, 0x0, 0x0, 0x1, 0x400, 0x3, 0x1, 0x6, 0x8, 0x9, 0x455, 0x3, 0x10000, 0xc79, 0x80000000, 0x800, 0x5, 0x7, 0xffffffff, 0x3f, 0x3, 0x7, 0x9, 0x3, 0x28a, 0x4, 0xfffff001, 0x7, 0x96, 0x2, 0x40, 0x4, 0xfffffffe, 0x48000, 0x2862, 0x1, 0x2, 0xffffffff, 0x5, 0x7, 0x7fffffff, 0xfffffffe, 0xfffffffb, 0x0, 0x4317, 0x10001, 0x6, 0x2, 0x401]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x9}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x2}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8, 0x0, 0x80000000, 0x5cb5, 0x8, 0x3, 0x101, 0x9, 0x1, 0xfffffffa, 0xffff, 0x2, 0x1000, 0x1, 0x1000, 0x100, 0xccc, 0x400000, 0x2, 0x1ff, 0x8, 0x3, 0x1, 0x1ff, 0x5, 0x1, 0x7fffffff, 0x5, 0x7fffffff, 0x1eee6661, 0x2, 0x0, 0x4, 0x0, 0xff, 0xfffffffc, 0x1f, 0x57, 0x6, 0xfff, 0x101, 0x6, 0x5, 0x81, 0x0, 0x3, 0x401, 0x4ff, 0x1, 0xdf57, 0x0, 0xfffffff8, 0xfff, 0x1, 0xd, 0x1, 0x4, 0x1000, 0x1, 0x3f, 0x0, 0x73a4, 0xffff, 0x7d75, 0x9, 0x3b351a66, 0xa1, 0x4, 0x4, 0x401, 0x3, 0x9, 0x2, 0x1, 0xe8ac, 0x8, 0xff, 0x3, 0x6, 0x1ff, 0x7, 0x8001, 0xfffffff7, 0x8000, 0x7ff, 0x7, 0x9744, 0x8, 0x2, 0x3, 0x8, 0xfffff94f, 0x7fff, 0x0, 0xfffffe00, 0xffff8000, 0x5, 0x1f, 0x80000000, 0xfd6f00, 0x6, 0x2, 0x4, 0x8, 0x0, 0x125d, 0x0, 0x1, 0x0, 0x7, 0x1, 0x3, 0x101, 0x10001, 0x4, 0x0, 0x1, 0x1, 0x5, 0x3, 0x1, 0x9, 0x8, 0x6, 0x80000001, 0x0, 0x7, 0xfffffce8, 0x5, 0x3, 0xd5, 0x0, 0x4aa5, 0x1, 0x23ea, 0x3f, 0x7fffffff, 0x2, 0xf6ef, 0x68ed, 0x1, 0x10000, 0x7, 0x10000, 0x1, 0x6, 0x9, 0x9, 0xfffffffa, 0xff, 0x9, 0x3, 0x7, 0x3, 0x5, 0x8, 0x3ff, 0x0, 0x9642, 0x0, 0x20, 0x1000, 0x2, 0x9c1, 0x9, 0x2800000, 0x0, 0x63, 0x9, 0x500000, 0x7, 0x8, 0x2, 0x4, 0x5cf, 0x3, 0xfab, 0x7ff, 0xffffffff, 0x6, 0xffff, 0x7ff, 0x84, 0xed, 0x81, 0xfffffffa, 0x7, 0x9, 0x8, 0x5, 0x1, 0x973, 0x8, 0x8d60891a, 0x8, 0x2, 0x1, 0xad2, 0x8, 0x3, 0x1, 0x5, 0x8, 0x6, 0x16e, 0x0, 0x1, 0x9, 0x0, 0x5, 0x6, 0x80, 0x1, 0x7ff, 0x81, 0x7, 0x2, 0x8, 0x7, 0x800, 0x5e9e, 0x5, 0x0, 0x9, 0x5, 0x0, 0x90000, 0x2, 0x1, 0x0, 0x2, 0x400, 0x7f, 0xd90, 0x8, 0x20, 0x4, 0x7, 0x400, 0xfffffff8, 0x5, 0x800, 0xc7c, 0x2, 0xfffffffa, 0x1000, 0x7, 0x3, 0x4, 0xba01, 0x8, 0x20, 0x0, 0x3, 0x9, 0x7]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x2}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x4, 0xfffffff9, 0x3, 0x6ff2, 0x0, 0x3, 0x5, 0x4, 0xfffffffe, 0xc0, 0x5, 0xbf, 0x8, 0x7fffffff, 0x6, 0x2, 0x240000, 0x10000, 0x4, 0x128563d3, 0x7f, 0x80000000, 0x3, 0x9, 0xfff, 0x7, 0x3ff, 0x6, 0xc39, 0x57, 0x3f, 0xbd4a, 0x7, 0x8, 0xfffffa65, 0x9, 0xc95, 0x9, 0x8000, 0x2, 0x6, 0x3, 0x0, 0x5779, 0x5, 0x5, 0x8, 0x5, 0x4, 0x8000, 0x4, 0x3, 0xa7, 0x80, 0x81, 0x5, 0x8, 0x2, 0x2, 0x5050, 0xe4fb, 0x3, 0x6, 0x8, 0x7f, 0xfffffffd, 0x7f, 0x800, 0x0, 0x38789e5a, 0x1000, 0xffff, 0x4b54, 0x2, 0x3, 0x8, 0x7, 0x6, 0x87, 0x6, 0x183, 0x0, 0x40, 0x1, 0x9, 0x8, 0x2, 0x1, 0x2, 0x4, 0x9, 0x7ff, 0x3, 0x6, 0x200, 0xfffffbff, 0xfffffffc, 0x0, 0x5a3, 0xffff7fff, 0x6, 0x916, 0x10001, 0x0, 0x7, 0x5d, 0xffff02bb, 0xf7, 0x67, 0x6, 0x1ff, 0x7ff, 0x101, 0xa870, 0x17, 0x7, 0x40d, 0x3, 0x7, 0x3, 0x8, 0xffff, 0x4, 0x5, 0x7fff, 0x8001, 0x4, 0x101, 0xff, 0x2, 0xffffffff, 0x9, 0x0, 0x7f, 0x0, 0x4, 0x2, 0x101, 0x7, 0xffffff15, 0x100, 0x1ff, 0x3, 0x1, 0x3, 0x81, 0x3, 0x7fff, 0x8, 0x80000000, 0x40, 0x3, 0x7f, 0x1, 0x478, 0x2f6, 0x8, 0x3, 0x6a4600f0, 0x1ff, 0xfffff769, 0xffffff62, 0x2, 0x9, 0x8a9, 0xa0, 0x0, 0x7bfa410b, 0x5, 0x0, 0x6, 0x7fff, 0x4, 0x2, 0x8, 0xd11e, 0x6e13, 0x100, 0x3f, 0x0, 0x9f, 0x6, 0xffffffff, 0x0, 0x9, 0x2, 0x1, 0x8, 0x1, 0x3f, 0x8, 0x4, 0x9, 0x3da, 0x8, 0x8a57, 0xfff, 0x7, 0x0, 0x4, 0xee5a, 0x4, 0x7fffffff, 0x3, 0x7, 0x1ff, 0x40, 0x6, 0x4, 0x8, 0x5, 0x7f, 0x6, 0x400, 0x7fffffff, 0x4, 0x80000000, 0x9, 0x1000, 0xfff, 0xffffffff, 0x6, 0x100400, 0x400, 0x8, 0x3, 0x6, 0x0, 0x200, 0x0, 0x0, 0x6, 0x9, 0x6, 0x1, 0x9, 0x8, 0x3f, 0x9, 0x2, 0x4, 0x1, 0x1, 0x6, 0x6, 0x200, 0x8, 0x5, 0x4, 0x1, 0x9, 0x7fffffff, 0x5, 0x412530dc, 0x0, 0xfff]}], [@TCA_POLICE_RESULT={0x8, 0x5, 0xc00000}, @TCA_POLICE_TBF={0x3c, 0x1, {0x210, 0x3, 0x7, 0x3ff, 0x86be, {0x98, 0x0, 0x7, 0x6, 0xdb2}, {0x5, 0x2, 0x3, 0x3ff, 0x3ff, 0xfff}, 0x93c, 0x1, 0x2}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x6, 0x6, 0x2, 0x1, {0x3f, 0x1, 0x810, 0x4, 0x1, 0x9}, {0x1f, 0x1, 0x515, 0x4, 0x401, 0x7fff}, 0xff, 0x100000, 0xe0ee}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x7, 0x7, 0xffffffff, 0x2, 0x1a7, {0x1, 0x2, 0x6, 0x5, 0x80, 0x7ff}, {0x3, 0x2, 0x3f80, 0xec, 0x0, 0x6}, 0x3, 0x2, 0xe1}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x9}]]}, {0x34, 0x6, "c844457e7d6d79dade4e3c716148e08d06fc0e51075ebc3b40d51c9fbcd00cb91d50bb40f23ec81621d9a569d3aabe11"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_skbedit={0x110, 0x1a, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x8, 0x1f, 0x5, 0x7f, 0xfffffbff}}]}, {0xc9, 0x6, "143944cda9648d72e333b7436008e89713e608b3730202233fbe24c80ba24aac3e8616cfd8479592b7ccf393cb085148b07fba433ac9a2ea8fcb3af39572b181b1a16f13e8ccc522ba87f8fe4715144718de0f29467d8c7b22b68474bd6716fd6ca8f99ec8859037bf553b572c0eb247247af780209e4338c18b3d39773353288bec6b6fdf1d7c502dbf781d1681b99ab6655540f30ce30eae60f890564d92008baf68c86ec311946cecee8dbafba78e3b28842fd48aa49a0bcfb990ccfe6430c82e2faec2"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_mpls={0x12c, 0x2, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x44, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5, 0x6, 0x2}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x3, 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x2}}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x7, 0x4, 0x1, 0xff, 0x3}, 0x2}}]}, {0xc0, 0x6, "dc3b609b8b8937a5abe74c4c6ff057693a18bc26b344a92cec401f55f190af92f9fb1bb538b3dd4784c6e41c00c781ebec9496c08bda98a2428ff9605356495a4b05f4ec181d5c6e9e2d4faa1bdefbda7136fc5a09b3824417d7e4623853c3f4d52da52a11866ecf27e35f22fb9481fb2fb4955038047e785744aab4d37688504fea5e15e7fb903d7e83e620ff8d552a3e8c3efc8fe662810f80186785b5f2824098ecb3f69259abdd439bef07ca8b15827621fc328e606071d7c4d0"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_RSVP_CLASSID={0x8, 0x1, {0xfff1, 0xfffc}}]}}, @TCA_CHAIN={0x8, 0xb, 0x6}, @TCA_CHAIN={0x8, 0xb, 0x402}, @TCA_RATE={0x6, 0x5, {0x2, 0x1f}}, @TCA_RATE={0x6, 0x5, {0x7, 0x8}}]}, 0x1a2c}, 0x1, 0x0, 0x0, 0x80}, 0x40) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) recvmsg$can_raw(r4, &(0x7f00000029c0)={&(0x7f0000000380)=@l2tp6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000002940)=[{&(0x7f0000000400)=""/185, 0xb9}, {&(0x7f0000000500)=""/51, 0x33}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000540)=""/178, 0xb2}, {&(0x7f0000002880)=""/188, 0xbc}, {&(0x7f0000000680)=""/103, 0x67}], 0x7, &(0x7f0000000600)=""/47, 0x21}, 0x2) lseek(0xffffffffffffffff, 0x1, 0x0) lremovexattr(&(0x7f0000002a00)='./file0\x00', &(0x7f0000002a40)=@known='system.posix_acl_access\x00') [ 397.552878] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 397.591967] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x0, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 397.605891] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 397.795920] FAT-fs (loop3): Unrecognized mount option "nfP?nostaÿ" or missing value [ 397.814080] FAT-fs (loop4): invalid media value (0x00) [ 397.819435] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e66733d6e6f7374616c655f726f2c00cf9e30e244aaf51c6e743904b749480b0e09a6a6320c9abf72781f351f882e594541470313f9a2863b82b8f5d1f317d4e5978e8de8c30f6a190063b763169f3f68176b2f99c1c164fa83adc45ce0ed20256a545a75f5aa23b1d3d6077c369227d7432df68bb230e3e4616f99b83316684df65a5ca53aa7cd9c691e078dc89975a43ee4aecba286886a1131c1d9d816805458a2e508d83f58eb0a8fa2a1a64d72220279d1112634c2"]) open_by_handle_at(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="1400ff7d00be30c774f9becc51214746753ffa4321f37a07d192d7b6f8c3104892ee7ebb97bf43f6d9d677124b4f3214674ac6b56919cbfc4614e034bb3cbb5b806a4e21076f5556d96374d92b4277265edec6434d40585cd3f6a20d8eac78cd29d0758154f857b17f870202195ad587"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f00000003c0)='./file0/file0\x00', 0x4000, 0x20, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) write$FUSE_ENTRY(r3, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x4, 0x0, 0x370, 0x6, 0x5b32, 0x3, {0x0, 0x3f, 0xa, 0x20, 0x800, 0x0, 0xab, 0x4, 0xa, 0x8000, 0x1, r4, r5, 0x0, 0x1f}}}, 0x90) getgroups(0xa, &(0x7f0000000140)=[r2, r2, r2, r1, r1, r2, r2, r2, r2, r2]) setresgid(r5, r1, r6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)=ANY=[@ANYBLOB="7472616e733d756e697273696f6e3d3970323030302e652cb721567f6163636573733d000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 397.845688] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 397.966921] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x0, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:10 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a02000274", 0x14}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 398.068145] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 398.075803] FAT-fs (loop3): Unrecognized mount option "nfP?nostaÿ" or missing value 00:49:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00005, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) open(&(0x7f0000000140)='./file0\x00', 0x272203, 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 398.236255] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="2c00044c07dc9119f557d2dc040bf054ca01043b2722619925957f36a9d0df0d9b1b7ff24e8c333760365c3451c6f1c23ffd62708a8b716ebacf4f14316ead6a78"]) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 398.376595] FAT-fs (loop4): invalid media value (0x00) [ 398.381932] FAT-fs (loop4): Can't find a valid FAT filesystem [ 398.389261] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:10 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x0, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 398.535030] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 398.596423] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 398.620705] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:11 executing program 3: sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x9, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 398.733858] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 398.742271] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a02000274", 0x14}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:11 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x0, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') 00:49:11 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 399.160436] FAT-fs (loop4): invalid media value (0x00) [ 399.186225] FAT-fs (loop4): Can't find a valid FAT filesystem [ 399.228921] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 399.245256] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 399.252196] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400", 0x15}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) close(r0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:11 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 399.427381] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1400005d424551d7f04eebf3189cf586bba20072e0cf6eb2ba49569533b068ee36fecb76f32357e05f87ef579536fe83cfb9c34ae198656c58ef48d1124671daca839b696f631f95c4a5f0c061155354beb33d8705cc92a06a4f55e5b2f089c5dbfb69b80c51d3e04e87479f4837d1e8e624cabb570b"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:49:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x0, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(0x0, &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 399.722086] FAT-fs (loop4): invalid media value (0x00) [ 399.735080] FAT-fs (loop4): Can't find a valid FAT filesystem 00:49:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400", 0x15}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 399.762976] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) setsockopt$inet_tcp_int(r2, 0x6, 0x4, &(0x7f0000000140)=0x9, 0x4) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:49:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) setgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 399.982081] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 400.051361] FAT-fs (loop4): invalid media value (0x00) 00:49:12 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 400.154461] FAT-fs (loop4): Can't find a valid FAT filesystem [ 400.182872] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 400.285583] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:12 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x0, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:12 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', 0x0, 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400", 0x15}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 400.481851] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 400.549520] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="0450623b34ac0800090000ff01e66174000404090a02", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0xfffffffffffffffd}], 0x0, &(0x7f0000000180)={[{@fat=@check_strict='check=strict'}, {@nodots='nodots'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x2100, 0x8) 00:49:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x0, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB=')~t0x0}, 0x0) setreuid(0x0, r2) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x841040, &(0x7f0000000340)={[{@mode={'mode', 0x3d, 0xffff}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x100000001}}, {@mode={'mode', 0x3d, 0x6}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@uid_gt={'uid>', r2}}]}) 00:49:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', 0x0, 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 400.769420] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 400.807369] FAT-fs (loop4): invalid media value (0x00) [ 400.817113] FAT-fs (loop3): bogus number of FAT structure [ 400.835185] FAT-fs (loop3): Can't find a valid FAT filesystem [ 400.845869] FAT-fs (loop4): Can't find a valid FAT filesystem [ 400.854938] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x0, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfbfc, 0xfffffffffffeffff}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/icmp\x00') perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x66, 0x1, 0x3f, 0x1f, 0x0, 0x3, 0x49600, 0xd, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x0, 0x7}, 0x1028, 0x8000, 0x7, 0x2, 0x4, 0xff, 0x8000}, r0, 0x9, 0xffffffffffffffff, 0x8) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) r4 = add_key$fscrypt_provisioning(&(0x7f0000000340)='fscrypt-provisioning\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)={0x0, 0x0, @c='abcdefghijklmnopqrstuvwxyz0123456'}, 0x29, 0xffffffffffffffff) r5 = geteuid() keyctl$chown(0x4, r4, r5, r3) 00:49:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = getegid() setgid(r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000200)={0x0, 0x4, 0x7ff, 0x4}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="f58fc12ce22522851bd426a87d162c00"]) lseek(0xffffffffffffffff, 0x1, 0x0) [ 401.103924] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:13 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', 0x0, 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:13 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x0, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 401.297178] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 401.347065] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 401.394031] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 401.417221] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 401.432154] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 401.445392] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 401.471237] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 401.471599] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 401.481030] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 401.481841] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 401.481939] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 401.481972] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 401.482005] FAT-fs (loop3): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000140)=[{&(0x7f0000000040)="e20700090000ff01e66174000404090a0200027400d9", 0x13}, {&(0x7f0000000300)="6c48e027d636194b3ed1044e46fecf54668b267c62ca8fa55fbb4f3c8c00000000000000008552f2c00588ffa25776bd1d94a23fff50935d333d9727c2e54c6d316705f3668f790aa16a227d65313f4f570330f68ea00bb24916fa3d9284a5ca0472770f47bf17ea7d5e9da84e50c21e7b92ee13ffab413974", 0x79, 0x1f}], 0x1002000, &(0x7f0000000100)={[{@dots='dots'}, {@nodots='nodots'}]}) open_by_handle_at(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="97bd3c8948826b591e0e56482a1b5a04262e79a3ad8c1da85ece03ce8076f9ad8b46fc4d51f3ad3d59a4e40bd521e4eb674ffe3368546ddf05bd2ec2373da41fde47e20de4145bc202794cb986894bf01427f7634a83c16a5701d29a8f764bb8470ee6cfd28a6a3ca5b151a2ac574263472a128f242c996ec55b62daf08af00b29828b69c58f3523928359ae84889309c971b5970cea3944e60f93230f1a223c73b56da0ea3b3a47f85644f92c733a194bf6b0d8e0700c21038a9e0ce823"], 0x0) r1 = getegid() setgid(r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) accept$inet6(r2, &(0x7f0000002080)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000020c0)=0x1c) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 401.537844] audit: type=1800 audit(1617842953.954:194): pid=23224 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="/" dev="loop3" ino=278 res=0 [ 401.567180] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x0, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, 0x0) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x0, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 401.828829] FAT-fs (loop1): bogus number of reserved sectors [ 401.842323] FAT-fs (loop1): Can't find a valid FAT filesystem [ 401.857742] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:14 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x3}, 0x9db0}, 0x0, 0xffffefffffffffff, r0, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) readv(r1, &(0x7f00000021c0)=[{&(0x7f0000002080)=""/40, 0x28}, {&(0x7f00000020c0)=""/152, 0x98}, {&(0x7f0000002180)}], 0x3) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x0, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 402.197647] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 402.255387] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:14 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x0, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 402.354144] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 402.381668] FAT-fs (loop1): bogus number of reserved sectors [ 402.395889] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 402.422812] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() r2 = socket$xdp(0x2c, 0x3, 0x0) chdir(&(0x7f0000000440)='./file0\x00') vmsplice(r2, &(0x7f0000000200)=[{&(0x7f0000000140)="ed6dbf107b6d75faca464af890b9adf1fda75ca9f74a3f470e8c28bf499976e87a61233e02e60c8fc633fcdbe67a60d74324e5a0667401eb383fdbba988810088a63e4262c7e2daa3288662510c67b3e340c9c1e6554bf19d01e", 0x5a}, {&(0x7f0000000300)="eb0f53de070dbbcf65b22856768af1479460bc68ac629be066565e6f6be2cfa15b024b307cd53f8d8bdde63db6a034ed84dfa4ec6b9b1ef7aa0428305560484835478c57cf5157248bcd481b9871c2aa996e4802dd7861a39bcfd527acf4e67d6d2c55b9a2f3dc407f526ea603f8d8241394cee5a336078098a7eb8cbb2b4df43f46cfde507bc19e3730d169d383c352e419bae45b0b", 0x96}, {&(0x7f00000003c0)="a83e3f164e4542f2d3e1a960d7a685276ea23fbfb233ae5b243eafb59a740ffa525ceb04c5ec73bc8750f633f0562862d03341b6a743650f7d59c0dab9d849dffcee2625dacf13d178f8ecdec0ed35af1daff8c3fdc7147c6c782fcc99516fcb295539c61428ff2fbdf648add437e451377beb4bcefba20a090e51", 0x7b}], 0x3, 0x2) setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 402.469629] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) getegid() r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x40e040, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x2, 0x3f, 0x20, 0x1f, 0x0, 0x0, 0x8, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7ff, 0x4, @perf_config_ext={0x0, 0xc5}, 0x10041, 0x7, 0x0, 0x9, 0x15999a91, 0x1000, 0x101}, 0xffffffffffffffff, 0x4, r1, 0x0) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:49:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x0, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 402.631495] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x0, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 402.854955] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 402.942128] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 402.945186] FAT-fs (loop1): bogus number of reserved sectors [ 402.961222] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 402.970621] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 402.994270] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:15 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x0, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 403.221827] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:15 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x0, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 403.278796] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000300)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x12, &(0x7f0000002100)=ANY=[@ANYBLOB="0e3d2dfbc1a96337e5a03e2098269e4e9ff6040a5b28e0500d03bc3605ad4a93e2ad9317c7d8db2e076f00a31f8c7bc4eb5fb97010ecc4f2f0e867e5"]) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1432c40100"], 0x0) r1 = getegid() r2 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r2, r3, 0x0, 0x3, &(0x7f0000000180)='#@\x00'}, 0x30) setgid(r1) setregid(0x0, r1) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000002080)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000340)=ANY=[@ANYRESOCT=r6, @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) r7 = dup3(r0, r0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000000)={@private1, 0x77, r5}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) setsockopt$inet_tcp_TLS_TX(r7, 0x6, 0x1, &(0x7f00000020c0)=@gcm_128={{}, "1be88b692db157f9", "33f95798dfdb51edd82d582cc7f8c74c", "d50e8fe0", "0ca637ddf77b5d8a"}, 0x28) 00:49:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r0 = getegid() setgid(r0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) socket$kcm(0x29, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="6e66733d6e6f726f2c00000000010000"]) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0x43) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)=ANY=[@ANYBLOB="7472616e732d756e69782c706f7369ecb426912c76657273692f6e3d2d7032309a99fd046f17d9fc6573733d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x10, &(0x7f0000000200)={&(0x7f0000000140)=""/113, 0x71, 0x0}}, 0x10) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000002240)=0x0, &(0x7f0000002280)=0x4) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r6, &(0x7f0000000040)={0x2020}, 0x2020) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r7, &(0x7f0000000040)={0x2020}, 0x2020) bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0x14, 0x9, &(0x7f0000002080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x78}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @map={0x18, 0x8}]}, &(0x7f0000002100)='GPL\x00', 0x80000001, 0xdf, &(0x7f0000002140)=""/223, 0x41000, 0x4, [], r5, 0x1c, r6, 0x8, &(0x7f00000022c0)={0x2, 0x1}, 0x8, 0x10, &(0x7f0000002300)={0x3, 0x0, 0x1, 0xffffff6f}, 0x10, r4, r7}, 0x78) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 403.527992] FAT-fs (loop0): Unrecognized mount option "=-ûÁ©c7å > ˜&žNŸö [ 403.527992] [(àP¼6­J“â­“ÇØÛ.o" or missing value [ 403.548060] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 403.570451] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 403.689508] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x0, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x0, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 403.731106] FAT-fs (loop0): Unrecognized mount option "=-ûÁ©c7å > ˜&žNŸö [ 403.731106] [(àP¼6­J“â­“ÇØÛ.o" or missing value 00:49:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r0 = getegid() setgid(r0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="14000000721b416efcfb0d8f064f9e6ba8cd22b97d0dfff1fdfe81db0d8fa3db6ebd4ecc03657ba0bb471c82df5535ea703981ca4270124ca4ed8e2a3830840d06a654ef6f800c2f4a296bee764f9bf9d3b6ed963b243804686baa"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 403.924148] FAT-fs (loop3): Unrecognized mount option "nfs=noro" or missing value [ 404.072783] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 404.089690] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 404.157132] FAT-fs (loop3): Unrecognized mount option "nfs=noro" or missing value [ 404.164474] FAT-fs (loop1): bogus number of FAT sectors 00:49:16 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x0, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 404.259696] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e733d20d069782c706f73697861632c2c76657273696f6e3d650f82da6bb5731dc8b723872fe8193970323030302e752c6163638173733db04bc31118107a411ecd146ef3883c52cdef4ca52ae07f0f549922166493e79864a62a53c4b8d14d75c89d7295470cc4a5e24b0ced1f0bdc60f1817fee49ae313469415ac5", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lseek(0xffffffffffffffff, 0x1, 0x0) [ 404.313566] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 404.439478] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() mkdirat(r0, &(0x7f0000000140)='./file0\x00', 0xe2) setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 404.525573] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 404.547531] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 404.569158] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r0 = getegid() setgid(r0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='9p\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 404.684759] FAT-fs (loop1): bogus number of FAT sectors 00:49:17 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x0, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 404.751428] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:17 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 404.971772] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 404.989778] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 405.070389] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 405.136130] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, 0x0, 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$afs(&(0x7f00000020c0)='afs\x00', &(0x7f0000002100)='./file0\x00', 0x4, 0x1, &(0x7f0000002180)=[{&(0x7f0000002140)="41b55c786dc38d48cf367626348671f816f38306139764b767eaec4fa630236cd1cffa83083576642865d8e26faa2cd1f2", 0x31, 0x20}], 0x10a8430, &(0x7f00000021c0)={[{@autocell='autocell'}, {@flock_openafs='flock=openafs'}, {@autocell='autocell'}, {@flock_openafs='flock=openafs'}], [{@subj_type={'subj_type', 0x3d, 'team_slave_0\x00'}}, {@audit='audit'}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) renameat2(r0, &(0x7f0000002240)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000002280)='./file0\x00', 0x7) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000002080)=ANY=[@ANYBLOB="6e66733d6e6f7374616c655f726f2c0011dd7b62a2d7e5fbd2883f4f54e59f9db3df43c325973d1fd509179b38da743d91d41f09a3b727ca49"]) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000024c0)={0x7, &(0x7f0000002480)=[{0x6ced, 0x80, 0x4, 0x8}, {0x4, 0x4, 0xb2, 0x3}, {0x3, 0x6, 0x7f, 0x200}, {0x6, 0x1, 0x67, 0x3553}, {0x3, 0x80, 0x4e, 0x9}, {0xdee2, 0x1, 0x3, 0x81}, {0x9, 0x3f, 0x0, 0x2f}]}, 0x10) setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f00000022c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f00000023c0)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="ba8eccbb9f5d2201002c008e16d104fbb731214b905ed521b66eea5481c53d7b8cc5a7de3b987ed7aa145551ddbf53d4bae4c77c593501e2743a1c3cfe735865117a35bf0712e51b6d58e669e26ea4a9f081b82d0bc021710e8a3a11b4fd009c5b7a972020a9927490418a10cc49fba0"]) lseek(0xffffffffffffffff, 0x1, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x82240, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x9, 0x3, 0x2d8, 0x140, 0xffffffff, 0xffffffff, 0x140, 0xffffffff, 0x208, 0xffffffff, 0xffffffff, 0x208, 0xffffffff, 0x3, &(0x7f0000000180), {[{{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48, 'dst\x00'}, {0x0, 0x7, 0x0, [0x0, 0x9, 0x800, 0x4658, 0x0, 0x0, 0xff, 0x2, 0xff, 0x40, 0x8000, 0x6, 0x5, 0xfff, 0x100, 0x7ff], 0xb}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x2}, {0xffffffffffffffff, 0x4, 0x7}}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private1={0xfc, 0x1, [], 0x1}, [0xff000000, 0xffffff00, 0xffffff00, 0xffffff00], [0xffffff00, 0xffffffff, 0xff, 0xff], 'veth0_macvtap\x00', 'team_slave_0\x00', {}, {}, 0x1, 0x20, 0xa, 0x1f}, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20, 'TRACE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) statx(r1, &(0x7f0000002500)='./file1\x00', 0x6000, 0x7ff, &(0x7f0000002640)) read$FUSE(r4, &(0x7f0000000040)={0x2020}, 0x2020) openat(r4, &(0x7f0000000200)='./file1\x00', 0x410482, 0x1) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 405.198623] FAT-fs (loop1): bogus number of FAT sectors [ 405.207415] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xe71, 0x2, &(0x7f0000000140)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4caef7", 0x6, 0x1f}], 0x1080, &(0x7f0000000080)={[], [{@context={'context', 0x3d, 'unconfined_u'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) clone(0x2001100, &(0x7f0000000300)="d8cbbeacbd8e62d7ef7c5d2f32c88deba535bdfa93e9af3bd0c9542cb541adb68cb786fd4575692fd594d69df3ec42c35a18600af55e5d139319e56f0bc5a21b90b3d83f9edb790bf2f9665fd67cbf2f1f4142f274c18e64da3040af4d12c20ba31d73ace99dad9d95e44f871c038f2461620f4eae9697668742ee0cca51552e164234899cb2889efee657cf3db1070a0448bd4b30e52080eab15a5a976a1da6f2cb9bd61cdf1f2d786ab58f2c022f7b168b913c4c5f578bdecf63077c9babd5fa786c878cd6d1f6dd6b52976ba91fa10f28b0b19f0c0dc462130c295950b26c0041ea1184a2adff8997bc89680766", &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000500)="0fa02901d3f9c91dde777040700866fcf6636f3f85c2b724b564149f9ce978da9629aea3d387d4141e73eab2628dc883945391ba5014f1fc791c38eea39cc3768a50d0ad473f0ba7f0e14de698f4281eda734d5fcd04b4e4d004cc7c56592e5dab4d2abf2852209a2b4db9084ffcf9d2deb6e31add81db09d1f4391057eaa1a584955506930ee66adfccdc9e0fb2e91cb8342dd6556ba83e8fa4bd0ba1330aecac24e270b8a7fca100eefcca1b1c58378d4fb234efde3a97ac655a6a4b1dac1be670794243ddfd9d2791a959cedb436289c227f5fe731670cb227df6e1e897") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 405.370516] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 405.402067] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, 0x0, 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 405.418923] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6e66733d6edb0d6f7362b974616c655fd500c9a01260160ffc8510d5a0726f89fb9ea7d21aa7e0a48de332388801d0cdf060eaa369947555238dbb8df2b4e431ae914b7eabc5c895473891b2aecda47e4934df86e48b7fd197613644ffb8346c302cf4db5cfe8c4b6dc48810281171c549818cb3b233d91dd617626bda"]) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000080)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 405.633960] FAT-fs (loop1): bogus number of FAT sectors [ 405.640291] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 405.719728] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, 0x0, 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 405.761571] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 405.847956] FAT-fs (loop3): Unrecognized mount option "nfs=nÛosb¹tale_Õ" or missing value 00:49:18 executing program 0: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0, 0x0, 0x0, 0x0, 0x0, 0x80004}, r0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 405.938764] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 406.007735] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:18 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f0000000140)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@dots='dots'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="2f2c280ecdf932d800002f8d87a96f70fe87bfca95b8930e0f26936419a1b7b60abcde29f2f92129ae37ed80e0c1215093391571342aed8cc639cc9bf2b2d0aa16a9b920bd626eee3125f3abb7452ae515b310f0f73c76528f79b2153cd7d052489863c548fdff5ef87644ab0a7edd0d83793d557d37bb994600c8ed8e3f67d9a0db5f7e438b56f9429af0b5d92249ce3786eacab90ede2b7e721987f452a1d374051b74f1908dc1ee8165728360ac7c50b7954657d37440a60c65c300000000000000"]) lseek(0xffffffffffffffff, 0x1, 0x0) [ 406.173385] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 406.183170] FAT-fs (loop1): bogus number of FAT sectors [ 406.189053] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 406.218659] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {0x0, 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="b9dd41341bc775415da6118f0638f84cbd6bce18894ebdc6b6785a63b2dd1999fa93d3269757ce4ea11c730875b21d28057056a451a110b26721607d7933"], 0x0) r1 = getegid() setgid(r1) read$FUSE(0xffffffffffffffff, &(0x7f0000000880)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) setgid(r2) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000340)=ANY=[@ANYBLOB="7472616e733d756e69782c705401697861636c2c76657273696f6e3d3970323030432e752c6163636573733d", @ANYRESDEC=0x0, @ANYBLOB="1c147452db15e96e4653a9b5d9bb5ee9fc03b0d7f97534e4ccb2a0a4360e2da9d5265b0b732094fd3239b5fadb2da359af14c47e49b795fcc30ae117004a8ae49a3ed9d1d80d662a9dbe7900f9e95407735f8b9547628809a8756e412e0424ecc8e6e28f"]) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 406.402900] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) renameat(r0, &(0x7f0000000140)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="2c1ef6f2e558268ab83220d7d46d00"]) lseek(0xffffffffffffffff, 0x1, 0x0) [ 406.493201] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 406.539785] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 406.552496] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 406.656760] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 406.718969] FAT-fs (loop1): bogus number of FAT sectors [ 406.746266] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:19 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="f8d2ebd5a4fb300f6e66713d6e6f7374"]) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000002080)) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000340)="77e180b3fb1251caf68a3c658dbb06bdc76352ad36d6472c685a8fddedfbcf6314b15dc2115471ddaadda7e6d1814f96867d086683bde3519f3bc30d8f06302cf54bd79bcf505711aa39e9f7f55decd68854c9ef8f09aabd20f1f7595ca039d622616e8b55577b76388c5777420c9318ed2de8d860f591904bf6ff8b0983c51a5688a18746e62695b5e5164af16a6cff518ef09ae2f1ca05649f3c66849ef8dda1af0b3ac0335cecda76f0", 0xab}, {&(0x7f0000000880)="e82b136824c5b297c33bde9d49b608dd1a7a6c34870e05acf74b03b5b0ce0779dfd6fdf24e10ed90a91b30ebd263e874223a95808d11df5f28d4a16cb6f411641bb1cfed72f62d7be571315b4daa3fa7968bbad70cc091fbf19cd5b68e3181e9f1160f85c096f6b27708eb7f899f35e63cd411868010dc111ca09dbc9fc056092c6e7013ae375fced8cb10191fcbf3308bada148d03746545747a531c08cf997b2437a5503a8cfda9d361f09d07915dc6543bb29d943", 0xb6}], 0x2) [ 406.952244] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0), 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 406.999316] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 407.009563] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 407.031956] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) fcntl$addseals(r1, 0x409, 0x4) r2 = getegid() setgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:19 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:19 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x0, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 407.170672] FAT-fs (loop0): Unrecognized mount option "øÒëÕ¤û0nfq=nost0 0 0 0 0 0 0 0 [ 407.170672] 1 2 ram2 0 0 0 0 0 0 0 msdos" or missing value [ 407.269343] FAT-fs (loop1): bogus number of FAT sectors [ 407.288195] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000200)=@loop={'/dev/loop', 0x0}, &(0x7f0000000440)='./file0\x00', &(0x7f0000000600)='ocfs2\x00', 0x42401, &(0x7f0000000ac0)='nodots') r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6e66733d6e6f7334616c655f726f2c00c970bcf1e8f2f1a6864728e065ddd2de80fdbc53f7ef440a7a618b1cc0d7a9164eb22ba79c4587c82ae51271f2788c64c251b48b1abeaa2a006e41cd9ae1ae1ef1e6e0f3f912563b8cd7572081b088b1901e13d2d4aa4ea39ba9c0f8468d82cec468b7a699f31e2667cf680f7df0c3a813c3ebd91a577db2e966be006e1ae845beff0d1ce41be430283de76d3ae24379b31cb51d8fb17a4c139c48498006d5d43ce38ce62897481db9d6ac2ad7b8c3e1f367ea912e797d50ca44c8acde1322ddfdfb0b6b18bfe8763ba41aa41ade045bdcdfc20776c5267a1a6a4df204a780f12dad549e"]) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0x3, &(0x7f0000000980)=[{&(0x7f0000000340)="67d5e2b107f1e9a96ac95af0f5f0ad2ab261910cb782c2f83759ed2c5845377f70c9f81a53ea3506d2e613bc3d0f3b071b4a52a27917fb77bca4d0f8b50be61dd9cf702a763f8f848c252803afadd3dc90ead991003cd772baadb65cff1e0f0d5cc742bf24921d0c0c57f340745db6149669398d6c8f52072bd83c22d46ff9b7a4375c82e7d1819c254a38b380a11b67a60c763d7509128e27fa9e41d37ce696a8ed20432925fb09febb20a594c15c6f5e351c992da60ed610196aca16d8c8241e020ec07cd31aad056ebdb991ab1a0e1e630b9cdd94e8d913ff3ce278", 0xdd, 0x2}, {&(0x7f0000000680)="82f19523d608945cdef1d27d121ea55413e8771ce5de45a754aa3d4064eacf8f1ead10e989aeee4232a33828207368fb9f34dac209605beb3bebef39343627ab6240244a3e1d7f82e23e5c8270da36f76be1dbd0e9c3b11821dd4ba18bb942304428223538f000bcd22bfc7ae690b79c", 0x70, 0x9}, {&(0x7f0000000880)="63e14cf68ae46e0554fd35c3e67767a5015fb5cfde14d5a619bc17e02dfa9d000e715f2f19fd0a8c7323ed1d63e78a0110c34025eec909530d51d44378caa030aae5dceec6a64da201f74c16d32022eb3b168a0b171792df3753afe591ffb1322991144afba44571f1abb4271eb322360b68d377897b272e7d308f82510cd34788c9aacbe5024fefb93e2564201f68568388aa25acc16af5ccead7f43ef2b1a6ca7be7c14b93ee83e9103cc2bb3f838dc3e09bda447ec152f04d09a12a356595bcb55af01ae526cb7fdb12c51b1b9a398446f62e2b9178c3cd6aea46db878851376b695b1c3cee66", 0xe8, 0x9}], 0x4, &(0x7f0000000a00)={[{@nodots='nodots'}, {@fat=@fmask={'fmask', 0x3d, 0x3}}, {@nodots='nodots'}, {@dots='dots'}, {@fat=@fmask={'fmask', 0x3d, 0xfff}}], [{@uid_gt={'uid>'}}, {@uid_gt={'uid>'}}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)=ANY=[@ANYBLOB='tp\x00\x00\x00\x00\x00000.u,ess=\x00'/31, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 407.338770] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0), 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 407.402533] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() rmdir(&(0x7f0000000140)='./file0\x00') setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 407.541631] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 407.697979] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 407.731192] FAT-fs (loop1): bogus number of FAT sectors [ 407.736810] FAT-fs (loop1): Can't find a valid FAT filesystem [ 407.784099] FAT-fs (loop0): Unrecognized mount option "nfs=nos4ale_ro" or missing value 00:49:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x0, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0), 0x0, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x109) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 407.963323] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 408.049726] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:20 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 408.162590] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 408.171635] FAT-fs (loop1): bogus number of FAT sectors [ 408.178136] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:20 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x0, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 408.277405] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d", 0x3, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0000ce78e30b4971db055c0e12000000"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000380)=[&(0x7f0000000180)=':,\x00', &(0x7f0000000200)='\xa0#{/\xcd\x00', &(0x7f0000000340)='\x00'], &(0x7f0000000940)=[&(0x7f00000003c0)='trans=unix,', &(0x7f0000000400)='posixacl', &(0x7f0000000440)='9p\x00', &(0x7f0000000600)='msdos\x00', &(0x7f0000000680)='\x00', &(0x7f00000006c0)='{.\x00', &(0x7f0000000880)='access', &(0x7f00000008c0)='@\\\']\x00', &(0x7f0000000900)='-)\x00']) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 408.346800] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6e666c655f726f2c006e366e9ce0af9bc53302f0ad0c15a3dd0f608a581ca0953132602cd668b6b8956c77503dce802a2123dc6d1804fdf45c6c8db5772cfcd4ee6b11b5b987fe0e0f13b5c9b72f52c8d57668dbccb1d2cb9293b9cbc21844314251614721dd25ed2800000000000000"]) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1480000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r3, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_MARK_BUFS(r3, 0x40206417, &(0x7f0000000080)={0x7, 0x58, 0x85f8, 0x9, 0x8, 0x20}) lseek(0xffffffffffffffff, 0x1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000006700)='.\x00', &(0x7f0000006740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) getresgid(&(0x7f00000067c0), &(0x7f0000006800)=0x0, &(0x7f0000006840)) pipe(&(0x7f0000000180)={0xffffffffffffffff}) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) write$FUSE_ENTRY(r8, &(0x7f0000000300)={0x90, 0x0, 0x0, {0x4, 0x0, 0x370, 0x6, 0x5b32, 0x3, {0x0, 0x3f, 0xa, 0x20, 0x800, 0x0, 0xab, 0x4, 0xa, 0x8000, 0x1, r9, r10, 0x0, 0x1f}}}, 0x90) syz_fuse_handle_req(r3, &(0x7f0000002080)="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", 0x2000, &(0x7f0000006c40)={&(0x7f0000004080)={0x50, 0x0, 0x400, {0x7, 0x21, 0x40, 0x2080000, 0xbf7, 0x3ff, 0x4, 0x101}}, &(0x7f0000004100)={0x18, 0x0, 0x96, {0x20}}, &(0x7f0000004140)={0x18, 0x0, 0x0, {0xbbe9}}, &(0x7f0000004180)={0x18, 0x0, 0x5, {0x101}}, &(0x7f00000041c0)={0x18, 0x0, 0x100000001, {0xbc6}}, &(0x7f0000004200)={0x28, 0x0, 0x8000, {{0x97, 0x2, 0x2}}}, &(0x7f0000004240)={0x60, 0x0, 0x6, {{0x5, 0x3, 0xfff, 0xe66a, 0x8001, 0x4, 0x488, 0x1f}}}, &(0x7f00000042c0)={0x18, 0x0, 0xdf, {0x3f}}, &(0x7f0000004300)={0x11, 0x0, 0x4, {'\x00'}}, &(0x7f0000004340)={0x20, 0xfffffffffffffffe, 0x4, {0x0, 0x14}}, &(0x7f0000004380)={0x78, 0x0, 0x10e0000000, {0xcb2, 0x4, 0x0, {0x6, 0x2, 0x1, 0xfff, 0x40, 0x61, 0x80000001, 0x2, 0x1, 0x6000, 0x5, 0x0, 0x0, 0x100, 0xd56}}}, &(0x7f0000004400)={0x90, 0x0, 0xffffffffffffffff, {0x2, 0x200, 0x9, 0x5, 0x2b, 0x5, {0x5, 0x9, 0x2, 0x5, 0xae, 0xfffffffffffffffb, 0xd3e0, 0x3, 0x20, 0x1000, 0x5, r2, r5, 0x8, 0x101}}}, &(0x7f00000044c0)={0x118, 0xfffffffffffffffe, 0xfffffffffffffffe, [{0x0, 0x1000, 0x4, 0x1ff, '![,&'}, {0x4, 0xffffffff, 0x8, 0x6, 'posixacl'}, {0x3, 0x0, 0x2, 0x3, '-*'}, {0x0, 0xbe, 0x6, 0x6, 'msdos\x00'}, {0x0, 0x8, 0x6, 0x1, 'access'}, {0x1, 0x58, 0x0, 0xd8}, {0x6, 0x9, 0x0, 0x2}, {0x4, 0x5, 0x6, 0x8001, 'msdos\x00'}, {0x4, 0x800, 0x0, 0x7}]}, &(0x7f0000006880)={0x298, 0x0, 0x800, [{{0x2, 0x1, 0x2, 0x3f, 0x8, 0x4, {0x3, 0x9, 0xff, 0xff, 0x400, 0x800, 0x4, 0x3, 0x5, 0xb000, 0x8, 0x0, 0x0, 0x80, 0x1}}, {0x3, 0x9, 0x10, 0x7ff, 'version=9p2000.u'}}, {{0x2, 0x1, 0x7, 0xff, 0x10000, 0x2c, {0x5, 0x3, 0x80, 0x1, 0x4, 0x40, 0xfff, 0x33a, 0x8000, 0xc000, 0x6a799833, 0x0, r5, 0x7f}}, {0x1, 0x3, 0x3, 0x3, '9p\x00'}}, {{0x1, 0x0, 0x9, 0x1000, 0x5, 0x5, {0x2, 0x6, 0x7, 0x9, 0x8, 0x7, 0x2, 0x8, 0x7fff, 0x4000, 0x20, r6, r1, 0xdd8, 0xffffffff}}, {0x3, 0x3f, 0x8, 0x6, 'posixacl'}}, {{0x3, 0x3, 0x1ff, 0x7, 0x0, 0x8, {0x0, 0x20, 0x9db, 0x0, 0x7, 0x100000001, 0x1eca, 0xffffffff, 0x7fffffff, 0xc000, 0xff, r4, r7, 0x2, 0x7}}, {0x5, 0x8, 0x5, 0x1, ']]&.@'}}]}, &(0x7f0000006b40)={0xa0, 0x0, 0xffffffff, {{0x1, 0x2, 0x1c, 0x7ff, 0xc108, 0x9, {0x1, 0x34, 0x800, 0x100, 0x1, 0x1000, 0xb5a, 0xf1, 0x3, 0x8000, 0xffffffe0, r2, r10, 0x9, 0x10000}}, {0x0, 0x1a}}}, &(0x7f0000006c00)={0x20, 0xffffffffffffffda, 0x2, {0x1, 0x4, 0x56, 0x8634}}}) [ 408.506375] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 408.570672] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 408.573334] FAT-fs (loop1): bogus number of FAT sectors [ 408.584886] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d", 0x3, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 408.663719] FAT-fs (loop3): Unrecognized mount option "nfle_ro" or missing value 00:49:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x0, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 408.792235] FAT-fs (loop3): Unrecognized mount option "nfle_ro" or missing value 00:49:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000380)=@sr0='/dev/sr0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='9p\x00', 0x10, &(0x7f0000000440)='/dev/input/mice\x00') bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000200)='/dev/input/mice\x00', 0x2000) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x1, 0x6, 0xdf, 0xf8, 0x0, 0x9, 0x1, 0xa, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x2359eec7, 0x2}, 0x230, 0x9, 0x0, 0x1, 0x7, 0x0, 0x7}, r0, 0xc, r1, 0x2) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r3 = getegid() setgid(r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)=ANY=[@ANYBLOB="747201040000756e69782c706f73698b536de80690bd45276c545402d840327861636c2c76657273696f6e3d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) lseek(0xffffffffffffffff, 0x1, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') [ 408.861099] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 409.017051] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 409.028740] FAT-fs (loop1): bogus number of FAT sectors [ 409.040047] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='nKs=noR?\x00\x00\x00\x00\x00\x00\x00\x00']) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) 00:49:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="140000"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 409.081637] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d", 0x3, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x0, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 409.215779] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 409.296847] 9pnet_virtio: no channels available for device /dev/sr0 [ 409.317905] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002080)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) r4 = dup2(r1, r0) perf_event_open(&(0x7f00000021c0)={0x1, 0x70, 0x40, 0x20, 0x0, 0x1, 0x0, 0x9e1, 0x24000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000002180), 0xb69310b66cb93af7}, 0x50848, 0x1, 0x3ff, 0x3, 0x80000000, 0xcb89, 0xa328}, 0xffffffffffffffff, 0xa, r4, 0x13) read$FUSE(r3, &(0x7f0000000040)={0x2020}, 0x2020) mkdirat(r3, &(0x7f0000000140)='./file0\x00', 0x40) 00:49:22 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 409.564147] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 409.581761] FAT-fs (loop1): bogus number of FAT sectors [ 409.598894] FAT-fs (loop1): Can't find a valid FAT filesystem [ 409.612096] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac", 0x5, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="140000"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x0, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 409.748331] FAT-fs (loop0): Unrecognized mount option "nKs=noR?" or missing value 00:49:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x1, 0x73, 0x6, 0x0, 0x0, 0x20004, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x400, 0x0, @perf_config_ext={0x80000000, 0x8}, 0x1, 0x2, 0x3, 0x9, 0x1, 0x1, 0x8000}, 0xffffffffffffffff, 0x7, r0, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 409.846848] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000880)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r2 = dup3(r0, r0, 0x80000) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x40, 0xbc, 0x0, 0x4, 0x0, 0x5, 0x20000, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000140), 0x1c}, 0x13810, 0x2008000000000, 0x4, 0x2, 0x5, 0x1, 0x100}, r1, 0x9, r2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r3 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r4 = getegid() setgid(r4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:22 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 409.981980] FAT-fs (loop0): Unrecognized mount option "nKs=noR?" or missing value [ 409.998788] FAT-fs (loop1): bogus number of FAT sectors [ 410.004556] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=unix,posixacl,version=9p2000.u,access=', @ANYRESDEC=0x0, @ANYBLOB="2c00a23889f3b882052c67fdc446b8705a24a1e08cc844d792f46af654df97"]) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 410.079892] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="140000"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = dup(r0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x8, 0x1010, r1, 0x786b2000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r3 = getegid() ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x40, 0x1, 0x1c, 0x5, 0x0, 0x6, 0x202, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x1, @perf_config_ext={0x8, 0xfffffffffffff04d}, 0x1050, 0x81, 0xffffffff, 0x1, 0x8, 0xffff, 0xc5}, 0x0, 0xb, r0, 0x0) mount(&(0x7f0000000300)=@sg0='/dev/sg0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='cifs\x00', 0x800, &(0x7f00000003c0)='version=9p2000.u') setgid(r3) open(&(0x7f0000000400)='./file0\x00', 0x4400, 0x150) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x109080, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x70, 0x3, 0x4e, 0x5, 0xfa, 0x0, 0x80, 0x8, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x1ff}, 0x10002, 0x8, 0x8, 0x0, 0x2, 0x8, 0x4}, r4, 0xf, r0, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0x115) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) [ 410.245593] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac", 0x5, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) 00:49:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x0, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 410.374490] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 410.415443] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.465543] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 410.468528] FAT-fs (loop5): Filesystem has been set read-only 00:49:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) statx(r0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000140)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 410.562670] CIFS VFS: Malformed UNC in devname. [ 410.564524] FAT-fs (loop1): bogus number of FAT sectors [ 410.576450] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 410.600510] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r2, &(0x7f0000000040)={0x2020}, 0x2020) ppoll(&(0x7f0000000140)=[{r2, 0x4}, {r0, 0x5c5}], 0x2, &(0x7f0000000180), &(0x7f0000000200)={[0x4]}, 0x8) r3 = getegid() setgid(r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) lseek(r0, 0x4, 0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 410.601855] FAT-fs (loop1): Can't find a valid FAT filesystem [ 410.618274] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.630317] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.681430] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac", 0x5, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 410.736880] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.770946] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 410.791333] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.801363] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.811327] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.824137] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.838685] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.849366] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.865288] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.917798] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.945462] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 410.984444] FAT-fs (loop5): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 411.029650] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 411.075926] audit: type=1800 audit(1617842963.544:195): pid=23965 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="/" dev="loop5" ino=279 res=0 [ 411.096597] FAT-fs (loop1): bogus number of FAT sectors [ 411.102056] FAT-fs (loop1): Can't find a valid FAT filesystem [ 411.116787] FAT-fs (loop0): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0, 0x0, 0x0, 0x0, 0x0, 0x30000000}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 411.125360] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, 0x0, &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 411.206105] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 411.252826] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) [ 411.263785] FAT-fs (loop2): error, fat_get_cluster: invalid start cluster (i_pos 0, start f8000000) 00:49:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:23 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x10080, 0x0, 0xfffffffc}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="6e66733d6e6ff374616ca85f726f2c0087b9afcfbd00000000dbdfb11f308dbc2635c684ea7ac123"]) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000600)='/dev/dlm-control\x00', 0x400001, 0x0) dup3(r0, r3, 0x80000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002b00)={{{@in=@local, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@private}}, &(0x7f0000000200)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000140)='tmpfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x6, &(0x7f0000002a40)=[{&(0x7f0000000340)="685b61ae1bb3a99f0e8f5bdf32dc4363c8e8ecac46255c985c399e38b75470a9a5ac2df253e74c7364b4b17ee2728bc860d396d2c22e78b738d938d12231220a34b5391630180230f313c98b596589ed560801a9a7cde3a4a7e3ebd16c538203fec9eb9cdc739ddcac611982d8b9fea6371224c572376f0a", 0x78, 0x35e}, {&(0x7f00000003c0)="f0c01005a9e626548da2bb8a9584a7b66ae4bbcde0b96f82144b4b63de919d5da919e72a04f9de740ce79e8cd561bbaed89a1f91c704fb38d6fa5dc6a9321fdf55bb4321cb49818b0c8f723620704f95ecd2d8ea8516532ed0b227ca85c3accca05a2feede50d442354671a8a97115b484425fc59179828cbd885c58c341d479ea64418a5d5f056df78924896ad0436fd0b69133d8ee2e8366cd88e212d4584e", 0xa0, 0x200}, {&(0x7f0000000880)="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", 0x1000, 0x6}, {&(0x7f0000001880)="24d1691ecdedb21873156289e6c34a3dd6655e4b037ea7c382c228e3f9bac938e23ffd8c55e9ef977bba611490ef0b9e715be070edfe402b425ae8edc45da9c343f200fb3004cf942c17514d56241c6b51354394140c7e81e9ed4cc938b0da997f9fdc4c08eae87c27a40ac078a426a8d1734c5fa222ac08f8fc8d4e5c7e301b65d10bd90d4bbea71cc85b9ebc8a0f4fcdf0f87bf362f9f4471590572d97cfd9d82cc907bcf88f0200", 0xa9, 0x2}, {&(0x7f0000001940)="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", 0x1000, 0x100000000}, {&(0x7f0000002940)="eaa36d64b4e67b6a691824f95ef2829da1aa75b068337f07ab1a5452385e00205fa6f953cc9578877543183ba84a9c8d9d92b08d1932c283c41dbd8cdcb89caf669a59d9eb99de7e45453748a90f62535cc2445c4d90dc625ce3fccbab1c7305e990aad0d240e0794d82a6994b23ffb36da0c014442eda25c40dd63b848d54ab469498ff694ab6444e304a1d516070b6b81f99da6fc0bd23bba1f463bcc2003c414b410bd1628589011f5d888f91c5f5dd73ecfa1155ff589092b3931fc41b8e8d8c5dcf98ad2dbe618674475a09552eccd038128be51e33832ade8075e82ce7909d6e0738de54ce7e220bcabcb5408ecc6d3ad493633497", 0xf8, 0x20}], 0x10010, &(0x7f0000002c00)=ANY=[@ANYBLOB='mode=00000000000000thin_size,huge=always,huge=always,uid=\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX=r4, @ANYBLOB=',mode=00000000000000000000777,smackfstran^mute=,-&(\\,smackfsdef=@\\/*}%,}),appraise,\x00']) r5 = syz_usbip_server_init(0x5) preadv(r5, &(0x7f0000000080)=[{&(0x7f0000002cc0)=""/203, 0xcb}], 0x1, 0x2, 0x3) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, &(0x7f0000000500)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000480)=0xacc, 0x4) [ 411.352302] audit: type=1800 audit(1617842963.814:196): pid=23997 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="/" dev="loop2" ino=280 res=0 00:49:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) getegid() r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x200000e, 0x10852, r1, 0xa468e000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x0, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 411.519130] FAT-fs (loop1): bogus number of FAT sectors [ 411.533827] FAT-fs (loop1): Can't find a valid FAT filesystem [ 411.589132] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 411.666034] FAT-fs (loop0): Unrecognized mount option "nfs=noótal¨_ro" or missing value [ 411.686635] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(6) [ 411.692849] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) 00:49:24 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, 0x0, &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 411.722312] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/diskstats\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f0000000040)={0x2020}, 0x2020) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x2, 0x40, 0x4, 0x6, 0x0, 0x7fff, 0x40000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffff63, 0x1, @perf_bp={&(0x7f0000000180), 0xb}, 0x1000, 0x7, 0x400, 0x6, 0x1, 0x3, 0x20}, r0, 0x0, r1, 0x2) r2 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="1478ea5d2a5fd26ceea653e750338600000072"], 0x0) r3 = getegid() setgid(r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) 00:49:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="14000000"], 0x0) r1 = getegid() setgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 411.804732] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 411.813244] vhci_hcd: connection closed [ 411.823817] vhci_hcd: stop threads [ 411.831645] vhci_hcd: release socket [ 411.868862] vhci_hcd: disconnect device 00:49:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, 0x0, &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x0, 0x61, 0x65, 0x0, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x0, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 411.929326] FAT-fs (loop1): bogus number of FAT sectors [ 411.939536] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) statx(r1, &(0x7f0000000300)='./file0\x00', 0x0, 0x100, 0x0) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000600)='security.capability\x00', 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000940)={'veth1_to_team\x00', &(0x7f00000006c0)=@ethtool_pauseparam={0x12, 0x5, 0x8, 0x1f9c}}) signalfd4(r0, &(0x7f0000000680)={[0xc4]}, 0x8, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x110420, &(0x7f0000000880)={[{@mode={'mode', 0x3d, 0x6}}], [{@fowner_lt={'fowner<'}}, {@subj_user={'subj_user', 0x3d, '9p\x00'}}, {@uid_eq={'uid', 0x3d, r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x63, 0x61, 0x65, 0x33, 0x31, 0x35, 0x63], 0x2d, [0x65, 0x56, 0x4, 0x32], 0x2d, [0x36, 0x63, 0x65, 0x38], 0x2d, [0x30, 0x63, 0x34, 0x63], 0x2d, [0x34, 0x30, 0x33, 0x33, 0x32, 0x36, 0x31, 0x30]}}}, {@hash='hash'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}]}) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, &(0x7f0000000480)=0xacc, 0x4) [ 412.080609] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r1 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) r2 = getegid() setgid(r2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@version_u='version=9p2000.u'}, {@access_uid={'access'}}]}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1f) lseek(0xffffffffffffffff, 0x1, 0x0) [ 412.181043] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:49:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) getegid() setgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 412.325369] FAT-fs (loop0): Unrecognized mount option "nfs=noótal¨_ro" or missing value [ 412.341092] FAT-fs (loop1): bogus number of FAT sectors [ 412.358117] FAT-fs (loop1): Can't find a valid FAT filesystem 00:49:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x9db0}, 0x0, 0xffffefffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={0x0, 0x0}, 0x20) r0 = syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nfs_nostale_ro='nfs=nostale_ro'}]}) open_by_handle_at(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1400000072"], 0x0) getegid() setgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000780)={{{@in6=@empty, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in=@private}}, &(0x7f0000000640)=0xe8) mount$9p_unix(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1a37088, &(0x7f0000000700)={'trans=unix,', {[{@posixacl='posixacl'}, {@access_uid={'access'}}]}}) lseek(0xffffffffffffffff, 0x1, 0x0) [ 412.381701] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 412.408138] vhci_hcd vhci_hcd.0: pdev(0) rhport(1) sockfd(5) [ 412.413957] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 412.490948] vhci_hcd: connection closed [ 412.491887] vhci_hcd: stop threads [ 412.499623] vhci_hcd: release socket [ 412.506888] kasan: CONFIG_KASAN_INLINE enabled [ 412.511473] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 412.518834] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 412.525078] CPU: 1 PID: 24056 Comm: syz-executor.0 Not tainted 4.19.185-syzkaller #0 [ 412.532955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.538470] vhci_hcd: disconnect device [ 412.542323] RIP: 0010:__lock_acquire+0x1eb/0x3ff0 [ 412.542339] Code: 2b 29 00 00 48 81 c4 98 01 00 00 44 89 f8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 2a 00 00 49 81 3e 20 d2 66 8c 0f 84 65 ff ff [ 412.569993] RSP: 0018:ffff888041c8f7d0 EFLAGS: 00010006 [ 412.575352] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 412.582617] RDX: 00000000000000fc RSI: 0000000000000000 RDI: 0000000000000001 [ 412.589896] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 412.597143] R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000001 [ 412.604387] R13: ffff88808efb0600 R14: 00000000000007e0 R15: 0000000000000001 [ 412.611647] FS: 00007efda8fd8700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 412.619862] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.625719] CR2: 000055d5d7f1b000 CR3: 00000000aee89000 CR4: 00000000001406e0 [ 412.632978] DR0: 0000000000000000 DR1: 0000000000008000 DR2: 0000000000000000 [ 412.640283] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.647530] Call Trace: [ 412.650119] ? mark_held_locks+0xa6/0xf0 [ 412.654157] ? finish_task_switch+0x118/0x760 [ 412.658645] ? _raw_spin_unlock_irq+0x24/0x80 [ 412.663127] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 412.667707] ? mark_held_locks+0xf0/0xf0 [ 412.671758] ? __schedule+0x88f/0x2040 [ 412.675642] ? io_schedule_timeout+0x140/0x140 [ 412.680245] ? try_to_wake_up+0x733/0x1050 [ 412.684462] lock_acquire+0x170/0x3c0 [ 412.688294] ? try_to_wake_up+0x7b/0x1050 [ 412.692587] _raw_spin_lock_irqsave+0x8c/0xc0 [ 412.697062] ? try_to_wake_up+0x7b/0x1050 [ 412.701190] try_to_wake_up+0x7b/0x1050 [ 412.705143] ? preempt_schedule_common+0x45/0xc0 [ 412.709889] ? migrate_swap_stop+0x900/0x900 [ 412.714276] ? ___preempt_schedule+0x16/0x18 [ 412.718714] attach_store+0x65b/0xaa0 [ 412.722496] ? valid_port+0x190/0x190 [ 412.726293] ? lock_downgrade+0x720/0x720 [ 412.730414] ? valid_port+0x190/0x190 [ 412.734199] dev_attr_store+0x56/0x80 [ 412.737977] ? component_del+0x550/0x550 [ 412.742014] sysfs_kf_write+0x110/0x160 [ 412.745965] ? sysfs_file_ops+0x1c0/0x1c0 [ 412.750088] kernfs_fop_write+0x2b0/0x470 [ 412.754213] __vfs_write+0xf7/0x770 [ 412.757818] ? kernfs_vma_page_mkwrite+0x230/0x230 [ 412.762730] ? common_file_perm+0x4e5/0x850 [ 412.767029] ? kernel_read+0x110/0x110 [ 412.770894] ? apparmor_getprocattr+0x11d0/0x11d0 [ 412.775712] ? __mutex_add_waiter+0x160/0x160 [ 412.780184] ? check_preemption_disabled+0x41/0x280 [ 412.785222] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 412.790228] vfs_write+0x1f3/0x540 [ 412.793833] ksys_write+0x12b/0x2a0 [ 412.797449] ? __ia32_sys_read+0xb0/0xb0 [ 412.801492] ? trace_hardirqs_off_caller+0x6e/0x210 [ 412.806485] ? do_syscall_64+0x21/0x620 [ 412.810538] do_syscall_64+0xf9/0x620 [ 412.814330] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.819504] RIP: 0033:0x41913f [ 412.822696] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 412.841692] RSP: 002b:00007efda8fd7b90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 412.849376] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000041913f [ 412.856624] RDX: 0000000000000007 RSI: 00007efda8fd7be0 RDI: 0000000000000007 [ 412.863875] RBP: 0000000000000007 R08: 0000000000000000 R09: 00007efda8fd7b30 [ 412.871174] R10: 0000000000000000 R11: 0000000000000293 R12: 00000000004afb38 [ 412.878426] R13: 00007efda8fd7be0 R14: 0000000000000000 R15: 0000000000022000 [ 412.885677] Modules linked in: [ 412.888852] ---[ end trace 42dccea2c421c5f7 ]--- [ 412.893591] RIP: 0010:__lock_acquire+0x1eb/0x3ff0 [ 412.898411] Code: 2b 29 00 00 48 81 c4 98 01 00 00 44 89 f8 5b 5d 41 5c 41 5d 41 5e 41 5f c3 48 b8 00 00 00 00 00 fc ff df 4c 89 f2 48 c1 ea 03 <80> 3c 02 00 0f 85 b3 2a 00 00 49 81 3e 20 d2 66 8c 0f 84 65 ff ff [ 412.917290] RSP: 0018:ffff888041c8f7d0 EFLAGS: 00010006 [ 412.922628] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 412.929873] RDX: 00000000000000fc RSI: 0000000000000000 RDI: 0000000000000001 [ 412.937120] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000001 [ 412.944368] R10: 0000000000000005 R11: 0000000000000000 R12: 0000000000000001 [ 412.951616] R13: ffff88808efb0600 R14: 00000000000007e0 R15: 0000000000000001 [ 412.958981] FS: 00007efda8fd8700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 412.967181] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 412.973051] CR2: 000055d5d7f1b000 CR3: 00000000aee89000 CR4: 00000000001406e0 [ 412.980298] DR0: 0000000000000000 DR1: 0000000000008000 DR2: 0000000000000000 [ 412.987545] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 412.994795] Kernel panic - not syncing: Fatal exception [ 413.000677] Kernel Offset: disabled [ 413.004285] Rebooting in 86400 seconds..