ffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)) 19:18:08 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 352.177976] FAT-fs (loop7): unable to read boot sector [ 352.225138] FAT-fs (loop11): unable to read boot sector [ 352.237657] FAT-fs (loop9): unable to read boot sector 19:18:08 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000400)={{0x3, 0x3, 0xb643, 0x6, 0x9290}, 0x0, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) utimensat(r1, &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={{0x0, 0x2710}, {0x77359400}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSRS485(r3, 0x542f, &(0x7f00000001c0)={0x800, 0x9, 0x9}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r4 = open(&(0x7f0000000380)='./file0\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r4, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000003c0)=0x40) [ 352.319147] FAT-fs (loop1): unable to read boot sector 19:18:08 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r4 = getpgid(0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r4, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x9) [ 352.356042] FAT-fs (loop5): unable to read boot sector [ 352.375981] FAT-fs (loop7): unable to read boot sector [ 352.397542] FAT-fs (loop3): unable to read boot sector 19:18:08 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x0, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:08 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)) [ 352.400152] FAT-fs (loop1): unable to read boot sector 19:18:08 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) sendfile(r1, r0, &(0x7f0000000040)=0x1, 0x26d9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f0000000400)={0xf, 0x7, {0x56, 0x0, 0x6, {0x3ff, 0x376}, {0x3}, @const={0x200, {0x7f, 0x8000, 0x8, 0x59}}}, {0xa3bd356985c6240c, 0x1, 0x0, {0x5, 0x1}, {0xffff, 0xfff}, @ramp={0x6b, 0xfe00, {0x44d, 0x98bc, 0x40, 0x7}}}}) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r4 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @remote}, &(0x7f0000000180)=0x10, 0x3de05c85e8ffd553) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e24, @loopback}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x40, 0x0, 0x0, 0x0, 0x1ff, &(0x7f00000001c0)='bcsf0\x00', 0x4, 0xc49c32, 0xf0}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r7, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r8, 0x200, 0x70bd29, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x80000001}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x2) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r5, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 352.475753] FAT-fs (loop11): unable to read boot sector [ 352.519020] FAT-fs (loop11): unable to read boot sector [ 352.526978] FAT-fs (loop9): unable to read boot sector 19:18:08 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r4 = getpgid(0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r4, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x9) 19:18:08 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0xa2c56a4f9c158e0a, 0x28) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x1c, r3, 0x10, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x20040000) 19:18:08 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x0, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 352.652052] FAT-fs (loop7): unable to read boot sector [ 352.663217] FAT-fs (loop5): unable to read boot sector 19:18:08 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 352.752192] FAT-fs (loop11): unable to read boot sector [ 352.781926] FAT-fs (loop9): unable to read boot sector 19:18:09 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ftruncate(r1, 0x7) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) getpeername$unix(r2, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) ptrace$cont(0x7, r3, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) fcntl$getownex(r4, 0x10, &(0x7f00000005c0)) ptrace$setregs(0xd, 0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000000480)="84a5472da056a71e12bdef41b85c8785c525af8d174b45d15325c39665f38d051092aebbebad0118decded2ec2b6e5e6d75cea8337b750be242fa6b56b2a239d0865b7fba36848691eef67df0255f7e4cef477fbafe03b88005ee7883716f931eb708932acf11aeb8322e46a7ee440253c004e1dea8f99bfa4067a857693a161e550e55a8dd127365bbd4a3bb43eb7944b03000000051ff5470df35a5376dc07ca63f66161423cb6fcbcc835b552b6b548cea941aa42844639da777bc81a131cda398a3e9a9fba0e4ef6f387b2019e906a5cec5a24865ae8d45894d297c9895a1be905341f4b0fd89563a8c5387055371776cab0c09e9f62bf4f859b80c956e2045021a5437efa185058f546f43b6281164634f313773ad1d5b206770a057107846abfc831e900000800"/310) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:09 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r4 = getpgid(0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r4, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x9) 19:18:09 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x0, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 352.917032] FAT-fs (loop5): unable to read boot sector 19:18:09 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 352.967046] FAT-fs (loop3): unable to read boot sector 19:18:09 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)) [ 353.021752] FAT-fs (loop11): unable to read boot sector [ 353.049034] FAT-fs (loop9): unable to read boot sector 19:18:09 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x80211, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r1, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000140)=""/226, 0xe2) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f00000002c0)="8fce9782b217b31c532859c0768f9d64", 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000240)={0x0, 0x6, 0x6, 0x3, 0x7}) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:09 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) mount(&(0x7f0000001500)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES16, @ANYRESHEX=r1, @ANYRESHEX=0x0, @ANYRESOCT=r2, @ANYRES32=r0], @ANYRES32=r1, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX=r3, @ANYBLOB="a31e5dd78b92311511687a4938e9"], @ANYRES16=0x0, @ANYPTR64, @ANYBLOB="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"], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r4, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:09 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 353.166094] FAT-fs (loop5): unable to read boot sector [ 353.189900] FAT-fs (loop3): unable to read boot sector 19:18:09 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 353.304855] FAT-fs (loop1): unable to read boot sector [ 353.306726] FAT-fs (loop7): unable to read boot sector [ 353.331087] FAT-fs (loop5): unable to read boot sector [ 353.344611] FAT-fs (loop1): unable to read boot sector 19:18:09 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r4 = getpgid(0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r4, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x9) 19:18:09 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000001c0)={0x0, 0xfff, 0x200, 0x7, 0x2, 0x9}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:09 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f00000003c0)="8c", 0x1, r1) add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="455c3c04f6d39f05d8530eabeebc967fdf604f25b73b258cb17392638e7a35a5b83f45f0f936bacf34f7701171570d9857cc6707972b630c010dfe955baacae7fbd0a55d520d546bf82a2d66d0051cc6e4158d734cf3cb5542e5a0938e53263fb46c3153", 0x64, r1) request_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, 0xfffffffffffffffe, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'\x00\x17\x94', 0x2}, 0x0, 0x0, r1) add_key(0x0, 0x0, &(0x7f00000003c0)="8c", 0x1, r2) add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="455c3c04f6d39f05d8530eabeebc967fdf604f25b73b258cb17392638e7a35a5b83f45f0f936bacf34f7701171570d9857cc6707972b630c010dfe955baacae7fbd0a55d520d546bf82a2d66d0051cc6e4158d734cf3cb5542e5a0938e53263fb46c3153", 0x64, r2) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000040)=""/60) keyctl$reject(0x13, r2, 0x4087, 0x7, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:09 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)) [ 353.490482] FAT-fs (loop3): unable to read boot sector 19:18:09 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 353.574535] FAT-fs (loop11): unable to read boot sector [ 353.600119] FAT-fs (loop7): unable to read boot sector 19:18:09 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)) 19:18:09 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x8) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) write$input_event(r0, &(0x7f0000000280)={{r1, r2/1000+30000}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000200)={0x2, 0x70, 0x6, 0x0, 0xf8, 0xfa, 0x0, 0xfffffffffffffff9, 0x400, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x31884, 0x7ff, 0x3, 0x0, 0x8, 0x60bf, 0x6}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 353.639136] FAT-fs (loop1): unable to read boot sector 19:18:09 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:09 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 353.738983] FAT-fs (loop3): unable to read boot sector [ 353.795401] FAT-fs (loop11): unable to read boot sector 19:18:10 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x4400, 0x0) connect$unix(r0, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) prctl$PR_GET_CHILD_SUBREAPER(0x25) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 353.877628] FAT-fs (loop7): unable to read boot sector 19:18:10 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r4 = getpgid(0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r4, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x9) [ 353.924508] FAT-fs (loop5): unable to read boot sector 19:18:10 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, @perf_bp={&(0x7f0000000400)}, 0x2403, 0x7ffe}, 0x0, 0xa, 0xffffffffffffffff, 0x1270fa139b92f0f) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000040)='./bus/file0\x00', 0x1) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r1, 0x0, 0x70bd26}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x70203a61}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r1, 0x1, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4020000}, 0x4000844) prctl$PR_SET_FPEMU(0xa, 0x2) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000140)=""/223) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 354.033844] FAT-fs (loop3): unable to read boot sector [ 354.072239] FAT-fs (loop11): unable to read boot sector 19:18:10 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0xa, r2, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r3, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r4 = getpgid(0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r4, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x9) [ 354.142272] FAT-fs (loop9): unable to read boot sector [ 354.162432] FAT-fs (loop1): unable to read boot sector [ 354.199878] FAT-fs (loop5): unable to read boot sector [ 354.232362] FAT-fs (loop7): unable to read boot sector 19:18:10 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair(0x11, 0x800, 0x4, &(0x7f0000000180)={0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000004700)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000001c0)=""/166, 0xa6}, {&(0x7f00000002c0)=""/129, 0x81}, {&(0x7f0000000380)=""/56, 0x38}, {&(0x7f0000000880)=""/4096, 0x1000}], 0x4, &(0x7f0000000400)=""/207, 0xcf}, 0x401}, {{&(0x7f0000000500)=@sco, 0x80, &(0x7f0000000640)=[{&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000000580)=""/179, 0xb3}], 0x2}, 0x9}, {{&(0x7f0000000680)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000003880)=[{&(0x7f0000000700)=""/201, 0xc9}, {&(0x7f0000002880)=""/4096, 0x1000}], 0x2}, 0x1ff}, {{&(0x7f00000038c0)=@ipx, 0x80, &(0x7f00000039c0)=[{&(0x7f0000003940)=""/19, 0x13}, {&(0x7f0000003980)=""/35, 0x23}], 0x2, &(0x7f0000003a00)=""/35, 0x23}, 0x3}, {{0x0, 0x0, &(0x7f0000003b00)=[{&(0x7f0000003a40)=""/178, 0xb2}], 0x1, &(0x7f0000003b40)=""/163, 0xa3}, 0x80}, {{&(0x7f0000003c00)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000004080)=[{&(0x7f0000003c80)=""/102, 0x66}, {&(0x7f0000003d00)=""/209, 0xd1}, {&(0x7f0000003e00)=""/109, 0x6d}, {&(0x7f0000003e80)=""/240, 0xf0}, {&(0x7f0000003f80)=""/197, 0xc5}], 0x5, &(0x7f0000004100)=""/14, 0xe}, 0x4}, {{&(0x7f0000004140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000043c0)=[{&(0x7f00000041c0)=""/212, 0xd4}, {&(0x7f00000042c0)=""/70, 0x46}, {&(0x7f0000004340)=""/99, 0x63}], 0x3, &(0x7f0000004400)=""/121, 0x79}, 0x3f60}, {{&(0x7f0000004480)=@un=@abs, 0x80, &(0x7f0000004600)=[{&(0x7f0000004500)=""/221, 0xdd}], 0x1, &(0x7f0000004640)=""/180, 0xb4}, 0x200}], 0x8, 0x0, &(0x7f0000004900)={0x77359400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) r20 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000004940)='/selinux/status\x00', 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000004a80)={&(0x7f0000004980)={0xe4, r1, 0x304, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0xe66}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7f}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xc72d}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x400}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffffffffffff0001}, @NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r0}, {0x8, 0x1, r3}, {0x8, 0x1, r5}, {0x8, 0x1, r7}, {0x8, 0x1, r9}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4d}, @NBD_ATTR_SOCKETS={0x44, 0x7, [{0x8, 0x1, r11}, {0x8, 0x1, r13}, {0x8, 0x1, r14}, {0x8, 0x1, r15}, {0x8, 0x1, r17}, {0x8, 0x1, r19}, {0x8, 0x1, r0}, {0x8, 0x1, r20}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xd271304a33c3e833}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x400}]}, 0xe4}, 0x1, 0x0, 0x0, 0x40010}, 0x4080) 19:18:10 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f00000003c0)="8c", 0x1, r1) add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="455c3c04f6d39f05d8530eabeebc967fdf604f25b73b258cb17392638e7a35a5b83f45f0f936bacf34f7701171570d9857cc6707972b630c010dfe955baacae7fbd0a55d520d546bf82a2d66d0051cc6e4158d734cf3cb5542e5a0938e53263fb46c3153", 0x64, r1) request_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, 0xfffffffffffffffe, r1) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={'\x00\x17\x94', 0x2}, 0x0, 0x0, r1) add_key(0x0, 0x0, &(0x7f00000003c0)="8c", 0x1, r2) add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="455c3c04f6d39f05d8530eabeebc967fdf604f25b73b258cb17392638e7a35a5b83f45f0f936bacf34f7701171570d9857cc6707972b630c010dfe955baacae7fbd0a55d520d546bf82a2d66d0051cc6e4158d734cf3cb5542e5a0938e53263fb46c3153", 0x64, r2) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000040)=""/60) keyctl$reject(0x13, r2, 0x4087, 0x7, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:10 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 354.263858] FAT-fs (loop11): unable to read boot sector [ 354.296014] FAT-fs (loop3): unable to read boot sector [ 354.342429] FAT-fs (loop9): unable to read boot sector 19:18:10 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r3, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r4 = getpgid(0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r4, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x9) [ 354.402847] FAT-fs (loop7): unable to read boot sector [ 354.414382] FAT-fs (loop1): unable to read boot sector [ 354.472550] FAT-fs (loop5): unable to read boot sector 19:18:10 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 354.505129] FAT-fs (loop3): unable to read boot sector [ 354.524080] FAT-fs (loop11): unable to read boot sector 19:18:10 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r4 = getpgid(0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r4, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept$inet6(r3, &(0x7f00000004c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000500)=0x1c) connect$inet6(r4, &(0x7f0000000540)={0xa, 0x4e20, 0x7f, @dev={0xfe, 0x80, [], 0x1b}, 0xc1f}, 0x1c) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000400)={'filter\x00', 0x0, 0x3, 0x14, [], 0x8, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000003c0)=""/20}, &(0x7f0000000480)=0x78) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xfffffffffffffc62) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 354.656781] FAT-fs (loop7): unable to read boot sector 19:18:10 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:10 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$selinux_create(r2, &(0x7f00000001c0)=@objname={'system_u:object_r:semanage_exec_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x5, 0x20, './bus\x00'}, 0x50) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 354.734642] print_req_error: 99 callbacks suppressed [ 354.734648] print_req_error: I/O error, dev loop3, sector 0 [ 354.749713] FAT-fs (loop3): unable to read boot sector [ 354.763959] print_req_error: I/O error, dev loop9, sector 0 [ 354.775142] FAT-fs (loop9): unable to read boot sector 19:18:11 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:11 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:11 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)={0x80000010}) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000140)='./bus\x00', 0x6000, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 354.832656] print_req_error: I/O error, dev loop1, sector 0 [ 354.843573] FAT-fs (loop1): unable to read boot sector [ 354.920488] print_req_error: I/O error, dev loop11, sector 0 [ 354.927186] FAT-fs (loop11): unable to read boot sector 19:18:11 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/38, 0x26, 0x40, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCPKT(r4, 0x5420, &(0x7f00000001c0)=0x9) 19:18:11 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0), 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 354.986757] print_req_error: I/O error, dev loop5, sector 0 [ 354.993676] FAT-fs (loop5): unable to read boot sector 19:18:11 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000140)="5631cf7772750345cf388e0cf1a1bb0b2d6a91dba0d5e5686679d81a90509326a8dcfe600f48daecedc5a9e6b0598d6328c3bfa2b23aa48895449d2f2746d1f629aa0781a89d7ba99708cc256380c820797ab45096529843c9a69b14d415a57a81e953f2188ae54bd2aeed37b80ab72e684fe81edef3757f48b66b6622023fbc00672ee2bede05d0024623") socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@empty, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 355.047681] print_req_error: I/O error, dev loop9, sector 0 [ 355.059848] FAT-fs (loop9): unable to read boot sector [ 355.066973] print_req_error: I/O error, dev loop3, sector 0 [ 355.076094] FAT-fs (loop3): unable to read boot sector 19:18:11 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:11 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 355.093867] print_req_error: I/O error, dev loop7, sector 0 [ 355.100537] FAT-fs (loop7): unable to read boot sector 19:18:11 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0), 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 355.144990] print_req_error: I/O error, dev loop5, sector 0 [ 355.151505] print_req_error: I/O error, dev loop11, sector 0 [ 355.157651] FAT-fs (loop11): unable to read boot sector [ 355.163696] FAT-fs (loop5): unable to read boot sector [ 355.174458] FAT-fs (loop1): unable to read boot sector 19:18:11 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x40, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, r1) r2 = add_key$user(&(0x7f00000008c0)='user\x00', &(0x7f0000000940)={'syz', 0x1}, &(0x7f0000000a80)="0bab7fe3761baadc329096adb31acc53fbb39dce9c789a27ddf6d1b865e8b98473a31a52e46f0a09e318e5108c530a4f28765559cce5ca39c437836a63ca1f19c94801713db670c69a26a62bbb7baf3bbe24545d0df1b6227c89832a0be7c70858fc9dd382b32cf4cdfb2167e014654950ec65a622fa4efcb01566498352bc3706277f3ff8ae6c099e33fb14caa747e05b953162fa312c2bf5e87098dfd63e05d9d23300f4b224156034adb14bc1977a456c916e508a3a16addaa938028987e1a7b2912c8028ab2605fcf5232d111558f419dbae9b1b76b482c7", 0xda, r0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f00000003c0)="8c", 0x1, r3) add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="455c3c04f6d39f05d8530eabeebc967fdf604f25b73b258cb17392638e7a35a5b83f45f0f936bacf34f7701171570d9857cc6707972b630c010dfe955baacae7fbd0a55d520d546bf82a2d66d0051cc6e4158d734cf3cb5542e5a0938e53263fb46c3153", 0x64, r3) request_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, 0xfffffffffffffffe, r3) keyctl$negate(0xd, r3, 0xfffffffffffefffc, 0x0) r4 = request_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000900)='crct10dif-arm64-ce\x00', 0xfffffffffffffffe) r5 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)="961e2d17901b7b5d22562ef77b7436ab989e8b1bea034d9012681cf4b2df5bab48cec907c790cd7251f9513e1cf1f53a278d9b6a6b33a5cc83de7c579ed2cd494d264b54b89714b70a2518b981e471d91247bc0f5fef06d69cd06d9bfb21cd84a34f0ca72f72899e5414cca59726c2216ff2e3e4165c93b2c0ca891451a6b7ea3e77b724d3724059c5b3acc3f8c93d887a31751a899789a8efaa8a8ecc47a0ca", 0xa0, r0) keyctl$dh_compute(0x17, &(0x7f0000000600)={r2, r4, r5}, &(0x7f0000000640)=""/197, 0x49, &(0x7f00000007c0)={&(0x7f0000000740)={'crc32\x00'}, &(0x7f0000000b80)="29e7640184d1d8ddf760ac168a9a7726e8a1a077ab38d12189275dfd285c852e970fd34d17de73f38f841840f43d6159c276e4047c627e6ba052ad40c918dab89ab941e527e6658addbdef96ed9880e5d06b4e4df571e8494fb3e2577ef3a6442f0e26ccaebad930dc9718ae16fcdac8d9405044b999643238f1e2f86b4951df207ad3e5c0ebef14118dd8d71501340b429fa3d2086daf99036188a8c0c6066eab33c771fec37d6256d818ef", 0x32}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) mount(&(0x7f00000003c0)=ANY=[@ANYRESDEC, @ANYRES64=r8, @ANYPTR64, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESDEC=r8], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES16=r6, @ANYRES16, @ANYRES16=r8, @ANYPTR64=&(0x7f0000000980)=ANY=[@ANYRESHEX=r9, @ANYBLOB="7b2782ea7af746998d58dafcd72643611b25043a9f5c1a599232990c3dae54e8028bcea7474bba910ae9877d0100008000af602aeb7b7033ff83a2"]], @ANYRESDEC=r11, @ANYPTR, @ANYRESOCT=r7, @ANYRES64=r8, @ANYRES64=r8], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ext3\x00', 0x200000, 0x0) r12 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) connect$inet6(r14, &(0x7f00000002c0)={0xa, 0x4e21, 0x7213, @ipv4={[], [], @loopback}, 0x6}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000200)=0x0) setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0xd38, 0x5}, {0xfffffff8, 0xffffff4e}], r15}, 0x18, 0x2) write$input_event(r12, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:11 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 355.294152] FAT-fs (loop3): unable to read boot sector 19:18:11 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:11 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 355.366594] FAT-fs (loop5): unable to read boot sector 19:18:11 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0), 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:11 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000001c0)=r1) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x8210a000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000400)='/dev/full\x00', 0x200000, 0x0) r7 = syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="21369e527d8859b5862b00d353440100f0a1a0e53fced26924758ff1b5100a1a4a3af9972b4d85924e6455ec1b40c7aa000000", @ANYRES16=r7], 0x2}, 0x1, 0x0, 0x0, 0x24008899}, 0x600095a) sendmsg$FOU_CMD_DEL(r6, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x4c, r7, 0x80, 0x70bd2b, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_PEER_V6={0x14, 0x9, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x73}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}]}, 0x4c}, 0x1, 0x0, 0x0, 0x400}, 0x4) dup2(r4, r5) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r2, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) rmdir(&(0x7f0000000200)='./bus\x00') write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:11 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x490840, 0x40) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:11 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) dup3(r1, 0xffffffffffffffff, 0x80000) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:11 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 355.473769] FAT-fs (loop3): unable to read boot sector 19:18:11 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 355.599373] FAT-fs (loop5): unable to read boot sector [ 355.638459] FAT-fs (loop11): unable to read boot sector [ 355.647707] FAT-fs (loop1): unable to read boot sector [ 355.660801] FAT-fs (loop7): unable to read boot sector [ 355.676340] FAT-fs (loop1): unable to read boot sector [ 355.679594] FAT-fs (loop11): unable to read boot sector 19:18:11 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffde9) fcntl$setstatus(r0, 0x4, 0x800) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00'}) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000001c0)='vxcan1\x00') ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:11 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000400)={@empty, @rand_addr=0x3e}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@remote, @in=@empty}}, {{@in6=@loopback}}}, &(0x7f0000000040)=0xe8) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000000440)={'nat\x00', 0xbf, "455b353c31e54ebde092abe22fa9ef5bd2102396dab5e9f913b42c637a181c4b68b2392ba84a2f4365efc2b3f357d31ff29854be0c01bf0568ea8f44ac8f03e7e378594e299d47b60da228ed572f34ebda18de8e6dd903865791cc0a283e189564c7f80db4c368d46da814f4549585cc629080deed094ca249095cfc5ebec793e830484415f8538031fee3f91374f9fbe25f0db8f143740c1a853919463638961db94909148fd5dd0a13a11426cb87c49ef4e20f94e01a5a1f302838991d4b"}, &(0x7f0000000540)=0xe3) clone(0x800080, &(0x7f00000002c0)="52f321e48c69a96b24a34d7686a40a6e25e9a1ead9e1c61d7373eeba945da087547142a8c6b94126c6c5a7f54d14c837f7b9d70a3f8399e4427edb642e751a08c08210abd615644a3f3ea95b04702f532f398f80f0922326f77fe9d76637a965714b91f03b0d501615ecf8bbd75be02a0a849e5cd9aa6c8f142d5bbb204e8edce539958337f39e9e1468189c0c3d788ad72b1586d1463bd69f69feca11a8334934a8561cbc40879b83155e2a14341a24229741a5fb01363e1d70e9f8d8fce54c81a5a9f7b89c1f7524caced0cd3ce851a9afe331d32b591b4d945f17a15f02cae1aa800819aaee449cb1f9cb89e867d507b736382485de0d941334f0a29933", &(0x7f0000000240), &(0x7f00000003c0), &(0x7f0000000400)) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 355.698619] FAT-fs (loop3): unable to read boot sector 19:18:11 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:11 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x7fffffff) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:11 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCSREP(r7, 0x40084503, &(0x7f0000000080)=[0x1, 0x6]) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) syncfs(r8) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) mount(&(0x7f00000002c0)=ANY=[@ANYRES32=r0, @ANYRESOCT, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYRESDEC=r2, @ANYRESOCT=0x0, @ANYRES32=r3, @ANYRES64=r3], @ANYRESDEC, @ANYRES64=r4, @ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRESOCT=r3, @ANYRES64, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRESHEX=r5]], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) write$P9_RREADLINK(r11, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r9, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$EVIOCGSW(r9, 0x8040451b, &(0x7f00000003c0)=""/215) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:11 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:12 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0xf, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0xd046c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:12 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)={0x2, r0}) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 355.920934] FAT-fs (loop1): unable to read boot sector [ 355.921379] FAT-fs (loop7): unable to read boot sector [ 355.937389] FAT-fs (loop11): unable to read boot sector 19:18:12 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 356.000484] FAT-fs (loop5): unable to read boot sector 19:18:12 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:12 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f00000003c0)=""/253) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r4 = syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000680)=ANY=[@ANYBLOB="21369e527d8859b586e70fd35344dab2f0a2aeaaf1b5100a1a4a3af9972b4d85924e6455cc1b40c7aa", @ANYRES16=r4], 0x2}, 0x1, 0x0, 0x0, 0x24008899}, 0x600095a) sendmsg$FOU_CMD_DEL(r1, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0xa238ac522f447afa}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x18, r4, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x8000}, 0x80) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 356.122332] FAT-fs (loop1): unable to read boot sector 19:18:12 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x2, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x1c, 0x18, {0x9, @bearer=@l2={'eth', 0x3a, 'veth1_to_bond\x00'}}}}, ["", ""]}, 0x38}, 0x1, 0x0, 0x0, 0x28000040}, 0x2000000) 19:18:12 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:12 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="2c086db9bb0bf00cc99018441562fbf9a0686f3fe9ff58b58170c4920c2d35054e4eea1e40ae8dd23dbab35b20f4c7bfc2d86842a66f2b8146f1a8476ea1e3376125dde4faafa9ea33fbf20d33a774f6c5d0d8b77bc5ae14c2b094f0c41d1574f5e89a79a4560444bf6dd656ce38cfd162bfb55015428a2413ca31c5428afe55c6beb252846f33fa5361ebc51c7f9b3c606ab83a9f182e210339e5c969951f0bc8330e8905d3860d5affa558634dca90c2da355fe8163db3f079443eaf9d6bc5306d80f00e9f36798716053768ab6b3dd01788b2183e6a9296a9da0f", 0xdc}, {&(0x7f00000001c0)="2b7a512ac974e3a5eeceec05e918565ff4add6f9ae660ec462092eb48dc30419649bc1d6d13a50bc64c8a18df900cc8a0da6ae058dfb7a5c97e185eb7a13bba7cf278bdeb08ccdf9e3984ac8eb", 0x4d}, {&(0x7f0000000240)="394603c93e10821cc619cd0dea0d7f488709ec48787cbdd9eecab63fb46f592f30cc15d2dad16a", 0x27}], 0x3}}, {{&(0x7f0000000500)=@isdn={0x22, 0x1a, 0x5, 0x80, 0x5d}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000580)="b04f39c0da0351a50214a81f376b698feb6ee5cf1628d0e1217a8b491e4db8c8cf248641e49d138a0b9fb8c1dcc2ae1c5b788a73c1e31d6a076e0635fc7f239e0402378b9f9e562b6e1175e28c7402993b456d1657345d04e0e4225db5df9d5bec97c3e96991de626b4d5c80e083c5bb7f0c9ce0ea0ace4e0c29b273e9181981b8073104c9e6f6785adeac1feed52e1973998008305c62545cbba596b31da5a303f96fedb36f991ca39470eca8737f", 0xaf}, {&(0x7f0000000640)="14198f42861d11b3a00489a6e5997f0620e81b283ae0fe5055bb5e35eeaf27b2871c049b1ce167e148cfb7baaf2c75433673098258c789365b3939cf8ee6c1767072b5b4aa20d3dd81d643ce341e2418a65de0f8beef92c973632968fd653d838df3743624456cc2d780887a11d9bb6db4d7785d9671c459dcb12703476872b9588133f2d0baff02648899943d74ca6f3a3b07b2a83b7f7c63efcf76237aa348c1a562f56c8efb40743497dc8a4423605838481c76e80235abe00f07640d8fe7ea24d42fae5efea8", 0xc8}, {&(0x7f0000000740)="1b23dee9a110d6c6b373646d17f2e582731ded08c56231a9214a4343eba086554dbe44562689fa4d6f0bffc022eb1216a32c44d97c8185f3ea", 0x39}, {&(0x7f0000000780)="e16587745a8cbd888a5ebef39ecf4f6a3c2df22e531bc83f6ed50dee0540913ff2fd2bb50d9cfd748abbb6d1925f21facc7d0aa689f5ffe8da0bd7010383245197dc0a3fc7cb08435957f65d2fc765c7a3050db4f45a011707b1f125cb8c1917cc0f772d68788081039d5a015f43a38df3cbc3c800f6ceb2a9386b162ccdefa0f525f28402d4b20f", 0x88}, {&(0x7f0000000840)="16f1cab49b6dd6f3d3b860a198b78b9fecca0f6c6094bbadad8626d4c9dc089ca8b39a6ea2a460ac9f006c76b308306f6018fe98638e7fc92dc8cf33311529cfc2e8babafdb6698a88e7377e567414d1b9e31e7ad2744def64a51121ef3f5101cfff4db954b8cd2dfa57e6f989c43ce02eaa73ebe4e27fa0f2b3ff19dc9c65eb17d14d4392e461460b3a150bca246b48c8c2eddb781cb0170a48d5d3d071729ff3e47d9a6fec12eb01e3270f96f592ec1333e7bcdc9f6230284b2cf9f957c7bf469a2026b9c28384", 0xc8}], 0x5, &(0x7f00000009c0)=[{0xb8, 0x84, 0x81, "8fb49a8eda0838f0cc1960ab8b696c876eac1b18a0320820a2f61d40aa85d6c3837e782d6c12e81d41ed6ef45626fb2f5fc212e996297fc60b7cc1129e921d431ac107d684ba3f156b97aab9a235d3f7e416aaeb635857d07cd2ccf906317925e826b1d927e367dfa9cdf68ac2f14040a6cd753041ed89975cc193a3b9bc613f021fc65b01ed90af1c84611e9df636631c65881fb46ab1e5b3f73b8e48fac9ed640a849c0a5ae2"}, {0x10, 0x117, 0x2}], 0xc8}}, {{&(0x7f0000000ac0)=@ipx={0x4, 0x6, 0x1, "aa9a612e18ff", 0x7}, 0x80, &(0x7f0000000f40)=[{&(0x7f0000000b40)="6b02328a2835dd9932a21cc03e27c18510726739bf287e3520efe05b1e33a7dec8b278d4559005757bddbaa91edfa8071f49f7df097c6e4d2e1666860733b715475ad5e2cf62cd49de45ded159f2eb7e66983d7c49198c2aeebff234553e3a7702e0690c747716461dc01f45709246ee02066e278d1b2cf08176243b4427d941972af80e1c09ee8c6b303b3624c3d06e444b244d8e2b6d67f6b1d1db157087fafc3dede91c808cd01bd3f5d59ae62bb81632c4a9a1283f954452ae4e8c483f27925512ba7f67f4b979309be693cd7e32b1e410a28b5de991724d8d6792aa31ed5a758d6576fa4f128a515d9dfb3cf605a059f0", 0xf3}, {&(0x7f0000000c40)="f2a42a968323d57f2d0254cb338299ac6e73c1abb41419b5f9cf405a66d79c4a251dea34721b0df87c79523e6cbf20b9b24372001d8acf0a18895e69a52cd36e6ca2db66f48cf761718d69655532f4154693b877de2973e3acd4c55e651db7a3323fbb7d39c24ff461d790529920a458af81bddbd2261b121bdad93309b5396d716e0edc06ba65974c08", 0x8a}, {&(0x7f0000000d00)="2c0d51eb846368ae08871d4042e926df929cf711277d374a9be2b02d3df6b3f740652e5e758898a8ef1bc0f55dbe7fbc6517899274ee5cc164caf10d27e776f5d7923851bf5c4fcf6f602bda5c6bac161a91042233cee4c8469f3602522a96fabb8eeeb54062ef205a6099dbaa12439c3e3f9edeb7f2331f5427be2e364647266688b9", 0x83}, {&(0x7f0000000dc0)="875717c68f3b8f4157eafadd9b9aff22de301633b7ab2f325dbfeff751b4d6029e2baeaa56f24566b749f15b2a14943ff7fec21e462ca74ced11fbed", 0x3c}, {&(0x7f0000000e00)="631682b9bc434cb23804c7834af4c2208ee9731950ced717d6f8e98d53943c65e1d83d78ea1079724af88c5949228ed0709d36", 0x33}, {&(0x7f0000000e40)="f1e48d52075e463fe3ed4bc88624990e9e6b5269658da97b9e1a9ac9eeb63c3f33889cbe08aef56a40ef6c5b09a38dce2e93d533304059f2584d357acdfe2e5637f83e288c30dd2dcfb0340da231f710df0f2d559e83f2be28d235818a13963a6d728763bb332380918d64091aed0a70a5479d4ee388e7fb56abf233cb36cbe793d8e8002cb9becb6ff98ae809b93b527644690bf0c88ec84fbccdead5e45f05b6cee454116962d1551330bec4c4e4b2ea5d1343004a4ce0e227248f06be58db434cbb", 0xc3}], 0x6, &(0x7f0000000fc0)=[{0x50, 0x109, 0xba03, "458986df069acae7395739ea46a17d6b866030b96784cc43fe8dcf499d18713dcf85d878b1279954f34b706689ccb1b6b7ac13fb6500d18e2805fb724c"}, {0x98, 0x101, 0xe573, "0b9b08d0a79b5aa3ef0f579179f3629ae813f9e602dcc05227a9fc6ca61e5897efa6bfe66f54d4990973152807a0e8104931112b47dec69d4f9bdd8c3bc707c943185196b182abd4de438c3be48a1231d77c569866f6572a35a70ec4aea5fd9d37ad9bfb958f49b74571de449a22e7f6c1455258a465434251405d564b4cd3ab48795ebb5ee2"}, {0x20, 0x1, 0x0, "3a62227bfb6fa36e840523f8f80464"}, {0x18, 0x1, 0x0, ' D'}, {0x70, 0x104, 0x20, "5eca622fd206f0bcb72c4b921427a3cd42fe5b422121feffe6757988f8676663fccab98a62fc5932447b79d076302cc6d68c4eb4c6c5029ea162acf083faa813d62790a5f7cf50464c2819983d5f2e6c3c3de745d4d6f912c1d2bd"}, {0x58, 0x84, 0x4, "0593433071ffeaf1d0902f558e8c8bd4aa1f09691162f0b772c89df727dae4b35ef8faab012dbe6333a52405803ce7a61360611568af6abbfc3e2b2773f9de552a"}, {0x28, 0x115, 0x8284, "6ace5233cbcbca83cf2bd6e93b1092a659119851"}, {0x28, 0x115, 0x3, "01756bf87d43e48b58a6b459e1d54229b2"}, {0xe8, 0x13, 0x2, "96e58a8fae1378e27ab54feb0d6e55bc10f127cdc3ed17dcbf2b0f2d71b59d05f0329592ba292df7065e059d435edc0ad1c83551dee94826c03ee42fd88d13767b79a7b9b47344cd835b79e5af67e4a0ba94be13c677428cc84f5b98f51bd582e8b44b43d7b12c0d2d33fc07733a3f92f95a9fb7eadce14092628cce8a7127c15568a707b625dfc8f58f70f3dd13a66f1edb995c28ab73db64f46cf8507bf1e20d72d7e73f9027fb91e66db17080125657e21b36ca8b58488c34af655f461bf16167136b6791ba8926ea23718ab1f223ff6ff3af26ba"}], 0x320}}], 0x3, 0x4001) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/108) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r2, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @initdev={0xfe, 0x88, [], 0x4, 0x0}, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 356.229556] FAT-fs (loop11): unable to read boot sector 19:18:12 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:12 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 356.392912] FAT-fs (loop11): unable to read boot sector [ 356.412117] FAT-fs (loop3): unable to read boot sector 19:18:12 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 356.435036] FAT-fs (loop9): unable to read boot sector [ 356.452366] FAT-fs (loop3): unable to read boot sector 19:18:12 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x6, 0x4, 0x6, 0x80, 0x0, 0x7, 0x80001, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0xf3d, 0x3}, 0x20040, 0x7562, 0xfffffffe, 0x1, 0x5, 0x6, 0x2}, 0x0, 0x7, r0, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) utime(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)={0x4, 0x8}) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:12 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f00000014c0)={'gre0\x00\xdb\x00', 0x407}) mount(&(0x7f0000000200)=ANY=[@ANYRESDEC=r1, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYPTR64, @ANYBLOB="0b1b53d4f8709c6aabfd63074969c29bf4cd634c1cc36836b7cd03f267940ea69f54d6818ab9b511525e9f60969fb1337221d2aa647f975abedfb13c99eb7c073e8bf57eefae732e8c3f6d27a76849f575edef1ceecd27a230a2cf49ba57622f615a7baec7753cd49dd9906172597e1ce3ebc4b1f5fee866878d1a54f29ea16ae71ced4345aebd9d889ebabc0a3ed5fb34bfd5bad37d5496a6ecda75eee0"], @ANYRES64=r13, @ANYRESDEC=r14], @ANYRES64, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYPTR, @ANYRES64=r0, @ANYRESHEX=r2, @ANYRES64, @ANYBLOB="3d236dde"], @ANYRESDEC=0x0, @ANYRES16, @ANYRES64=r3, @ANYRES32=r5, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESDEC=r6, @ANYRES64, @ANYRESOCT=r8, @ANYRESDEC=r10, @ANYRES16], @ANYRESOCT, @ANYPTR64], @ANYRESOCT], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r15 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) write$P9_RREADLINK(r17, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r15, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:12 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 356.615535] FAT-fs (loop5): unable to read boot sector [ 356.632881] FAT-fs (loop11): unable to read boot sector 19:18:12 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) open(&(0x7f00000001c0)='./file0\x00', 0x20400, 0x22) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x38}, 0x10) [ 356.668065] FAT-fs (loop11): unable to read boot sector 19:18:13 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:13 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$getown(r2, 0x9) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) r6 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r6) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000500)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000980)={0x0}, &(0x7f00000009c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a00)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000b00)=0xe8) r13 = getgid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r14) r15 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) fcntl$getownex(r17, 0x10, &(0x7f0000000b40)={0x0, 0x0}) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r20, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r21) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000000b80)={0x0, 0x0, 0x0}, &(0x7f0000000bc0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r24 = dup(r23) ioctl$PERF_EVENT_IOC_ENABLE(r24, 0x8912, 0x400200) getsockopt$sock_cred(r24, 0x1, 0x11, &(0x7f0000000c00)={0x0}, &(0x7f0000000c40)=0xc) stat(&(0x7f0000000c80)='./bus\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r27 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r27) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r29 = dup(r28) ioctl$PERF_EVENT_IOC_ENABLE(r29, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r31 = dup(r30) ioctl$PERF_EVENT_IOC_ENABLE(r31, 0x8912, 0x400200) r32 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000d40)='syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r33) r34 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f00000010c0)='msdos\x00'}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r35) r36 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001140)='/selinux/checkreqprot\x00', 0x4000, 0x0) r37 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r37, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r38) r39 = open(&(0x7f0000001180)='./bus\x00', 0x4040, 0x0) r40 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r40, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r42 = dup(r41) ioctl$PERF_EVENT_IOC_ENABLE(r42, 0x8912, 0x400200) r43 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r43, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r44 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000001200)={&(0x7f00000011c0)='./bus\x00', 0x0, 0x10}, 0x10) r45 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r45, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000002740)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000027c0)={{{@in6=@loopback, @in6=@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f00000028c0)=0xe8) r48 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r48) r49 = gettid() ptrace$setopts(0x4206, r49, 0x0, 0x0) tkill(r49, 0x3b) ptrace$setregs(0xd, r49, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r49, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000002900)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000002a00)=0xe8) r51 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r51) r52 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r52, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r54 = dup(r53) ioctl$PERF_EVENT_IOC_ENABLE(r54, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r55) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r57 = dup(r56) ioctl$PERF_EVENT_IOC_ENABLE(r57, 0x8912, 0x400200) r58 = accept$packet(0xffffffffffffffff, &(0x7f0000002a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000002a80)=0x14) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000002ac0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002b00)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000002c00)=0xe8) fstat(r0, &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000002cc0)=0x0) r63 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r63, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) fstat(r63, &(0x7f0000002d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r65 = socket$nl_netfilter(0x10, 0x3, 0xc) r66 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002d80)='/dev/ashmem\x00', 0x140, 0x0) r67 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r67, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r68 = gettid() ptrace$setopts(0x4206, r68, 0x0, 0x0) tkill(r68, 0x3b) ptrace$setregs(0xd, r68, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r68, 0x0, 0x0) r69 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r69, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r70, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r72 = dup(r71) ioctl$PERF_EVENT_IOC_ENABLE(r72, 0x8912, 0x400200) getsockopt$sock_cred(r72, 0x1, 0x11, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, &(0x7f0000002e00)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r75 = dup(r74) ioctl$PERF_EVENT_IOC_ENABLE(r75, 0x8912, 0x400200) ioctl$TIOCGSID(r75, 0x5429, &(0x7f0000002e40)=0x0) r77 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r77, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r78, 0x0) r79 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r79) r80 = openat$ion(0xffffffffffffff9c, &(0x7f0000002e80)='/dev/ion\x00', 0x90a00, 0x0) r81 = syz_open_dev$char_usb(0xc, 0xb4, 0x3f) r82 = gettid() ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000002ec0)=0x0) pipe2$9p(&(0x7f0000003500)={0xffffffffffffffff}, 0x800) r85 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r85, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r87 = dup(r86) ioctl$PERF_EVENT_IOC_ENABLE(r87, 0x8912, 0x400200) r88 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r88, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r89 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r89, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r90 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r91) r92 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r92, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r94 = dup(r93) ioctl$PERF_EVENT_IOC_ENABLE(r94, 0x8912, 0x400200) r95 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r95, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r97 = dup(r96) ioctl$PERF_EVENT_IOC_ENABLE(r97, 0x8912, 0x400200) r98 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r98, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r99 = openat$uhid(0xffffffffffffff9c, &(0x7f0000003a00)='/dev/uhid\x00', 0x802, 0x0) r100 = gettid() r101 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r101, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r102, 0x0) r103 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r103) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r105 = dup(r104) ioctl$PERF_EVENT_IOC_ENABLE(r105, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r105, 0x8903, &(0x7f0000003a40)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r108 = dup(r107) ioctl$PERF_EVENT_IOC_ENABLE(r108, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r108, 0x0, 0x10, &(0x7f0000003a80)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000003b80)=0xe8) r110 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r110) r111 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r111) r112 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r112) r113 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r113) getgroups(0x7, &(0x7f0000003bc0)=[r110, 0x0, 0xee01, r111, r112, 0x0, r113]) r115 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r115, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r116 = accept$unix(0xffffffffffffffff, &(0x7f0000004ec0)=@abs, &(0x7f0000004f40)=0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r117) r118 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000004f80)='/proc/self/attr/current\x00', 0x2, 0x0) r119 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000005000)={&(0x7f0000004fc0)='./file0\x00', 0x0, 0x10}, 0x10) r120 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r120, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r121) r122 = socket$inet6(0xa, 0x2, 0x2) r123 = gettid() ptrace$setopts(0x4206, r123, 0x0, 0x0) tkill(r123, 0x3b) ptrace$setregs(0xd, r123, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r123, 0x0, 0x0) r124 = getpgid(r123) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000005040)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000005140)=0xe8) lstat(&(0x7f0000005180)='./file0\x00', &(0x7f00000051c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r127) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005240)={0xffffffffffffffff}) r129 = gettid() ptrace$setopts(0x4206, r129, 0x0, 0x0) tkill(r129, 0x3b) ptrace$setregs(0xd, r129, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r129, 0x0, 0x0) r130 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r130, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r131, 0x0) r132 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r132) r133 = gettid() ptrace$setopts(0x4206, r133, 0x0, 0x0) tkill(r133, 0x3b) ptrace$setregs(0xd, r133, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r133, 0x0, 0x0) r134 = getpgid(r133) r135 = getuid() stat(&(0x7f0000005280)='./bus\x00', &(0x7f00000052c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000005340)={0x0, 0x0}) r138 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r138, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r139, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r141 = dup(r140) ioctl$PERF_EVENT_IOC_ENABLE(r141, 0x8912, 0x400200) fstat(r141, &(0x7f00000053c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r144 = dup(r143) ioctl$PERF_EVENT_IOC_ENABLE(r144, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r144, 0xc0502100, &(0x7f0000005440)={0x0, 0x0}) lstat(&(0x7f00000054c0)='./file0\x00', &(0x7f0000005500)={0x0, 0x0, 0x0, 0x0, 0x0}) r147 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r147) r148 = gettid() ptrace$setopts(0x4206, r148, 0x0, 0x0) tkill(r148, 0x3b) ptrace$setregs(0xd, r148, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r148, 0x0, 0x0) r149 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r149, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r150, 0x0) r151 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r151) getgroups(0x2, &(0x7f0000005580)=[0x0, r151]) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000005700)=[{&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000004c0)=[{&(0x7f00000002c0)="baa52c1ad1f54ec2e02b00b2e1aeef31f0677b4317d3cdb99aabca0881941c3446cb81022936cd55010352d25218c1f6a065ef5b19ebccfc6e9331937258c326b2b003ad4af3039fa26fb6005845d319d2aee36d15ee0a8466ab", 0x5a}, {&(0x7f0000000340)="370eaff183c87e5c69ad47377a01b38f5b2065da5d6110043127f651214f264d2ddc62c7f1b5347a2fe375e95c347f5ccbdc6dbd3c0c0e35f1fb67a4d20bb2795b2fe0c7e70fb197a22d0c93467cf91559eccb345127ee3ccf83b6dce0bc9d752d324109ec8b332a159b82ab0d69c83709fd4f1695699f2a0c39765083118f4ffbc5929aade588f2f5fd59c8b91304da010cdaf7d5a6957ddae7a940daf56678f1d51f4c", 0xa4}, {&(0x7f0000000400)="6f59b07a66b945f19018fd20486a9a5bcc08b351a7711c0bdc6172014983d868a4a4b8bf2797fbf8f00953024e1dd84a3138d499e3d5ec05b3a63610f1742e3e04a8f5bfeee5ec0bed12c74302c141d12b422025dd5e7c5db6f44d0e17a0390d67f3db0ba4367fb43efbd50fc14a6b400a4b61dc44fb22611df89e55f63c787725ae810dab35b9498441f6b01cfea0ae441fbea657e8f09a4a620036ed2a", 0x9e}, {&(0x7f0000000240)="634d9dd0c6d597c53ff16f98287038f3b33cb8e1eb6f5dc8", 0x18}], 0x4, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {r3, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}], 0x40, 0x20000000}, {&(0x7f00000006c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x10}, {&(0x7f0000000780)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000880)="c640f9", 0x3}, {&(0x7f00000008c0)="a84c76080efde3d5fab7dfcb10c52b059a4e9e5f1d1c0c8920630c6e001ea7cc23456880f6ccd9e903c96e7de759c6a55553be1a1c34403e4363639734bfc516558c5dd7d7c9df4c1d04c0445db7bf29b1770ac8775deb2f8471a2e2", 0x5c}], 0x2, &(0x7f0000000d80)=[@cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @rights={{0x1c, 0x1, 0x1, [r14, r0, r15]}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, r22}}}, @cred={{0x1c, 0x1, 0x2, {r25, r26, r27}}}, @rights={{0x20, 0x1, 0x1, [r29, r31, r0, r32]}}], 0xa0}, {&(0x7f0000000e40)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000ec0)="e4538c074b9f8371876f80e6899c47ddbe86046e39e64804f7282dd984a87c939c8f875cef60121560a4f05dd00203c0f41a1832d339644bfa3ff3082fc1c23d3d3bbfa41b3618e9285dfd528f7476341155a8f99a1375a8f47e5293ae43b74e896f824ca3698605f6c0de36396f67404c", 0x71}, {&(0x7f0000000f40)="f0f21d5dfea3f9c262fd1273cece5512f01be510ade81d52a9895d12d7bebf682e37fcf4df722ca4fc695e310953e1bebbc6310215f91dab0d37afda5df50094a93429f7ec5366956ee93bce334a830895f1fd5924a9fc202f3e4b3d48c64a59b1d3d14a7ad65c2c8e195f7d67900852bc701848e5fd1e132d5a78132f194dd74e13b7882464e38479a92b96913cea4ca5c0e173d484dba573c64e78b41d56049dca5146d5a109fb1547923f5d1c5e08f4706e8a06d94a30a98b91a8ac136bbd53b7e0f797d4b9c992d9", 0xca}, {&(0x7f0000001040)="4400993e88bd", 0x6}], 0x3, &(0x7f0000001240)=[@rights={{0x28, 0x1, 0x1, [r0, r33, r34, 0xffffffffffffffff, 0xffffffffffffffff, r35]}}, @rights={{0x28, 0x1, 0x1, [r36, 0xffffffffffffffff, r37, r38, r39, r40]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r42, r43, r44]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r45]}}], 0x90, 0x80}, {&(0x7f0000001300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000026c0)=[{&(0x7f0000001380)}, {&(0x7f00000013c0)="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", 0x1000}, {&(0x7f00000023c0)="be572acabce6377ea12e0c23e3b5a586ae8b8a6aac0f874101cd3c112b34066abaf4bf353feced34583a9fbc35f90df1a9fbf107695934be4d19f17917257a61318526f3bb879e8bcf0e0319e1c8b66b7ccb18613084c2ce3b9e6aa18dea235d2ddd0a662fd93e995a640dfd276a029e25be7dcc20994e901efcd795f32cb08b5183e45d03aa76669d56f80e4a5461d4b1f78f0faf6916b38a4b98b1df716e924f57a37120d3817166064ee118acb5af47258fe8d0bed184d4280c8d60b12e9d8c72f66e64f97099a88cffdafa3767a5a6b502a37831", 0xd6}, {&(0x7f00000024c0)="59fb5094bb952f07b07e520a1a38afca5f308d1ecfc873818ea2fa35f78578579be6da93ec0deafc297180592834e5751e136a5e199ab7b8730a7e9cdf2ac1df7b7e80361a11e682", 0x48}, {&(0x7f0000002540)="e53f77957c76f06589befb6dd7eafdcee968a1", 0x13}, {&(0x7f0000002580)="08aff51d466380c56e47f00fd43cdcff499e6ace4f854a3a88a0b8680b8da615691a8f040199397a19d3cdcc789e7dd6103f22ac43ce7910c6ffd539d50f795e0e2b0415aea0d19a0c031335", 0x4c}, {&(0x7f0000002600)="af3b549d1d6e42a0e8738715bbdf59e1c5e747a656329d19c03bbe96e5e17758c7700df0b93833e3dfcbe25453175db592e0ac9abbae4e86438a14f945deaf91ae9087f0da319d3f2e7cda78f4022b8d95570fc561f456dfbd6c86a0e7e822062ff549ed54b9744ed8734ec937a4ed1254c155ab19415664f07168b89ad6cd5e1033ea59d59dab550bc402f8b2d8b616f95f14aa2de7deb9efb172c20807590cda71a334caf53195b7aee383d6ab", 0xae}], 0x7, &(0x7f0000002f00)=[@cred={{0x1c, 0x1, 0x2, {r46, r47, r48}}}, @cred={{0x1c, 0x1, 0x2, {r49, r50, r51}}}, @rights={{0x2c, 0x1, 0x1, [r52, r54, r55, r0, r57, r58, r0]}}, @cred={{0x1c, 0x1, 0x2, {r59, r60, r61}}}, @cred={{0x1c, 0x1, 0x2, {0x0, r62, r64}}}, @rights={{0x20, 0x1, 0x1, [r65, r66, r0, r67]}}, @cred={{0x1c, 0x1, 0x2, {r68, r70, r73}}}, @cred={{0x1c, 0x1, 0x2, {r76, r78, r79}}}, @rights={{0x18, 0x1, 0x1, [r80, r81]}}, @cred={{0x1c, 0x1, 0x2, {r82, r83}}}], 0x148, 0x4}, {&(0x7f0000003080)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000003480)=[{&(0x7f0000003100)="839be7eaa5fdb8b27c31cc64d3aa8351411fea71346499ed5a2870b0b33e12dc2e839a4481203cee8cfb38f23ee57eebb53ccf816ea36a9cdcb05bcf9e6a11d1e7ef8a36b33a1a4978f623b1cfa03490eccf95ff4684018d581f308932", 0x5d}, {&(0x7f0000003180)="ccb46435167c1c389e90c9a65f096c0463671617f04ba39dc4d34cbb5b1cef4b319448d01b821d460312b2daac406ee5ffebe2b527018f69ab73a3bf7c4e654db38c1ba922276a2651e2d2a83db922b78aee4601b129b2dffe401ac3bd1db8dacc84d748de081d54de770df830ac426f4d69bf74db9b007c2006439a3f0847194a0314195b1f20829e69a963f2b3fff430cc5907a125659436a1e41e6291b1e617ca2f421f6c2b151d356bc3791924b5da6584f7b43a55fb22d5f8ac07bab59857289a478d098239302d6699123432", 0xcf}, {&(0x7f0000003280)="18388b56b802cc63d95f3029b4b134947238e8db25c322f94e7489a17b7f68619d30fc243d24245eb3b2de247764c1fa6630b0f8ec62b6d37a1e2f65bc8fdca413cd1551cfe328a8b29d5189f4758278bee01b1b9df7e34f1a28cd5ab0e641c6760730e6907a0326b5dcebbcd4519fcb7ab55192dd91796dc6e2792d7415a10e63298434504d1ba7c221062d5613d87a9f7f0cf8b1062c182e12ac1dc73c80967e7f60b8ed6f07efd3fe307aa2c7891064af3413e895a6d41a3c006b1f28ca6bbc29772e9646e7c002c61133", 0xcc}, {&(0x7f0000003380)="fdc3c4cfe679bf2186d84566a48ce5d8ae4c0cd7d99573f0e087cbc15b94a25b408a34b74b91ea922380abedb3017a03e3c4d6ce61a8550e2eda206a6b3dec8a5e20abeac9bccd4a1f7615bfc97f54a482c5eb7ff28d2055ff9dc74181fffe1b", 0x60}, {&(0x7f0000003400)="2db5d7ba55f1c3865d6175b984ac6c9a9449e5478a26842e5c4242ea1276e895ee523f5cdf619af083cf74a9b152fa2c8485b879a83f1fb993df2c97d6cbfd2a424a", 0x42}], 0x5, &(0x7f0000003540)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r84, r85]}}, @rights={{0x1c, 0x1, 0x1, [r87, r0, r0]}}, @rights={{0x18, 0x1, 0x1, [r88, r89]}}, @rights={{0x14, 0x1, 0x1, [r90]}}, @rights={{0x38, 0x1, 0x1, [r0, r0, r91, r0, r92, r0, r94, 0xffffffffffffffff, r95, r97]}}], 0xa8, 0x4028000}, {&(0x7f0000003600)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003980)=[{&(0x7f0000003680)="e66c381fb4ab75b572a40dfb4d40a0b8e406e7b6aeb4d4a599af82c96acb8878bd2570f20ab33c4a3b00be1327eb46830ec281be62e5c574758a082599", 0x3d}, {&(0x7f00000036c0)='Qi', 0x2}, {&(0x7f0000003700)="37e1fc6782b3ff72575d8b1edc039c90188edd7060819e540ef1363390425d30be962f9e65291fa10ba2e058c93c709303b61282564dd082f593f6b42079e3424a1329853195d272", 0x48}, {&(0x7f0000003780)="308d32e8824fa78d0d55d1a097ce385d6407f8f7593e58b6f19de56eb6bea8e9a4b513b01bb1f0f704139c1e2e9428fb808a5fd71e6bb99c8abb03daa027f4ae326790ab6ab918f56db892c6d67e89e4e57e5ee8815eb9a0786b6942cc66dc7ef1403536345bcdb560cccb3981c51d7a6093a1fbb79ae2d423d1a8b296d3aafd3b1df7c654cd9bf35fc0af9b2d7f040f6abd71b6f7420770bc5ae9180bb261cbebccb3abf32d2af4e8b261c64ce95b1757ac", 0xb2}, {&(0x7f0000003840)="b53abf791d0f48e8c122d6716e2d02176e159c7f0d156ec53c085a48c162d52d087688e958a0dfdb83b930cc7ea465ce7433ab01a57653a2dd34316df260a4c925b15f0adb0d5766f61ed8fde586357a6ebc4aa0eb4b151f76210aa7dc65d048eef0c782f0c6914635d89a560217283d4363ca5d7ebf7c0d05fde843a1329b7eaf0bc9a533c5b6680f70c059fac2af9eb7792f21f972d757167087b7cfef3ecfc1d9d7d7c8f508811cfabba23f97561842e4", 0xb2}, {&(0x7f0000003900)="a6bbdd8b052506", 0x7}, {&(0x7f0000003940)="a065dd0d685a1f2ebddd0b5e32300768c415a11b03e8a4d5856adbf9c314a5f0519d24fd575cee471bffc3717ce6977b4794c7743b960d1cf00b5530f8a21f91", 0x40}], 0x7, &(0x7f0000003c00)=[@rights={{0x2c, 0x1, 0x1, [r98, 0xffffffffffffffff, r99, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r100, r102, r103}}}, @cred={{0x1c, 0x1, 0x2, {r106, r109, r114}}}], 0x70, 0x4008040}, {&(0x7f0000003c80)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000004e40)=[{&(0x7f0000003d00)="bce6632ede2514fb5bdc6d28654bfd8003f9c620b07650dfc85834a20ca629175de9a2f2e457fa6894cc7797d85692d4", 0x30}, {&(0x7f0000003d40)="097823388be4e3b0e67a6b7cb73e38dae07a645333226f04b5491b309dc3fd58976f88b8b5d1558f4083c7629c69a08bb061", 0x32}, {&(0x7f0000003d80)="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", 0x1000}, {&(0x7f0000004d80)="92b0d25d0aac4e32c0c573f21de14c5326f8abcb7e987a08076c83eb6c69b8360f134f5fb334f98d7233a84043b57eb0ba7c62a37f50e0c5828fee84e79ecd23e2cce928a914cc0148", 0x49}, {&(0x7f0000004e00)="ad1028ddc2dd84eb90431d2ded4100baf8", 0x11}], 0x5, &(0x7f00000055c0)=[@rights={{0x38, 0x1, 0x1, [r0, r115, r0, 0xffffffffffffffff, r116, r117, r118, r119, r120, r121]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, r122]}}, @cred={{0x1c, 0x1, 0x2, {r124, r125, r126}}}, @rights={{0x20, 0x1, 0x1, [r127, r128, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r129, r131, r132}}}, @cred={{0x1c, 0x1, 0x2, {r134, r135, r136}}}, @cred={{0x1c, 0x1, 0x2, {r137, r139, r142}}}, @cred={{0x1c, 0x1, 0x2, {r145, r146, r147}}}, @cred={{0x1c, 0x1, 0x2, {r148, r150, r152}}}], 0x130, 0xc0000}], 0x8, 0x80b0) r153 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r153, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 356.795035] FAT-fs (loop5): unable to read boot sector [ 356.799647] FAT-fs (loop11): unable to read boot sector [ 356.916523] FAT-fs (loop7): unable to read boot sector [ 356.936255] FAT-fs (loop9): unable to read boot sector 19:18:13 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x1f) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f00000001c0)) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_MCAST_MSFILTER(r5, 0x29, 0x30, &(0x7f0000000a80)=ANY=[@ANYBLOB="04000000000000000a004e23000000a3ff020000000000000000000000000001060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000a004e2000000006ff010000000000000000000000000001faffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e230000002000000000000000000000ffff00000002ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e22000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008faf014bd791996b5083b9b5101840563789fec1000e3374a775c1c692330cfb2a56df4dcb996d1d27327a4f95381845c1dfefa4a52cf66c5ad9060289bc4df5910ba92ae307c1e63c86adb1829ee4ceab04a3f5ec40f652fc5be79287b2abac8402d50056e6d7627965d706bb2c7c8c4e00cd2141655733f1dd494afe185c5e8392817d48e359bf6788b59f539fa7de069beeb4197639ec10268bc96d11cc6f539ee643363872e767edfeeb75d3bc014d5e6e6d2dd572da75bb4dca398885b7967cae0429170f1cbf"], 0x210) write$cgroup_int(r3, &(0x7f0000000240), 0x12) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) writev(r1, &(0x7f0000000700)=[{&(0x7f00000003c0)="69ff4b6e3cdf7da284c801c8e34109c9a145ac42137d4812a16710c3d49a8e87705921945309592c65c30e1197dc5d3308b64c224d188b302076126c14c8beadc5d50332690283d99908b242975b53bf7807b57e9a619efb441f8526e3559832601b9133f701c71fb67aee42797e63f338bc54a4702c5fa76f22d948cd7bbb2b7e9901cb562a4dd9c1f82e557dd00a857851c1fdef8777df16e411f55a937e53d28dc913fd2f92d3ba", 0xa9}, {&(0x7f0000000480)="ab0950d1b37c220559418c658aa2c283e1a79b4b34be76f94ba1e3957fc39ac280248db21c891177a35b190302804cfc224a8a123d47bd26a8d3e1391b6f479923be03fc34963a1eef217a72aa2db824b2ba66bcda24d7ff559f404a812ec57cd348f8e275212e7f49ccdfb8e143defde242624c621f78f5c18f24731de4e161ef8842138043842ea8fc7fe8", 0x8c}, {&(0x7f0000000540)="0407bc359f81e1f2bef92a1e2a30c2ca9b9809bf792ab1b76ac95c1f673aa75735389a8556e0f2cbd72fb7e82f891e3fd4719314c446c73c9f85b02c4b9bcfb72be9c2a938ffc8a7e06216dbaef886cefaffc31bb267ba73935b51afaf1be5b4ef4c159d9e5f92f7b6", 0x69}, {&(0x7f00000005c0)="a5822e558ea64e6372e9749e5d29ac65fa6ba61ed9b9d5b6b5dccbb8a000a169934e70072bd3a5947ac3d92a7dd599b1e9a0d5d1761ee0e2307a1fd0fe7f438c32bb4d684c6e868e67a850fd65bb9f9f", 0x50}, {&(0x7f0000000640)="659c643f84de67900db2bd8166ccb8a0b597f5f1190c60c3ed325faff4cdf12460be0c1772d459225312040e6a4d49de13e621c96570a6d75cd74d6e7c803a2d178d47adf512c6711c0d415ae853550f7bd7304ec07729f57b6c16ffe0b2dda7e098cb7db32979751ff44a47fea32f3c703b764163279b8d35de5478c989979ae2136fff1a841d675b8fa9dfdd920fa9e14e0847f6b1ef4ceaf5f9ee46fc250af2e2", 0xa2}], 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000200)={'veth0_to_bond\x00', @broadcast}) write$input_event(0xffffffffffffffff, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e26, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:13 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:13 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) mount(&(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="1d0ac31df751bc0790dec555c77ce530adf181877fe7d256586ae165f3c9e23a534eff4a8e89489a1c24771a01ecad40d356aa91a3a2f731ce43809db0356998bb63d03e60c9234ecd1a089123bfc0f6313b3ee94f4116319d34ac1c9dd82e27384f6dba58e2b85e3ea157023fd4f12ed13f", @ANYRES16], @ANYRESDEC=0x0, @ANYRES64, @ANYRESOCT=r2, @ANYRESOCT=r3, @ANYRES16=0x0], @ANYRESOCT], &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_SIOCETHTOOL(r7, 0x8946, &(0x7f0000000200)={'bond_slave_1\x00', &(0x7f0000000080)=@ethtool_ringparam={0x11, 0x1000, 0x7, 0x100, 0x5, 0x3, 0x0, 0x6, 0x4}}) r8 = dup(r5) write$P9_RREADLINK(r8, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) write$selinux_create(r8, &(0x7f0000000140)=@access={'system_u:object_r:admin_passwd_exec_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x8}, 0x5c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:13 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:13 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x14, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x0, 0x9}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:13 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x2, 0x13, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000380), 0x5}, 0x4000, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r1 = fcntl$getown(r0, 0x9) sched_getattr(r1, &(0x7f0000000040)={0x30}, 0x30, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xf9e4916de917c13, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socket$inet6(0xa, 0x1, 0xed) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGVERSION(r4, 0x80044501, &(0x7f00000003c0)=""/164) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendto(r9, &(0x7f0000000480)="b2963fe6a4e75b9c343c64b64af5a4a2b99a18d0ff562a779fc9f5c6c620f198158adf0ae0a6f2b7e6dd5129cc07cc1740702f23e8672931ea3de13a2f464421ee5ba731dfa6360b4cca899a47544b90dc2aedca28b07dddfe5522a1122dbc4c424e9949aadbe24138754a124a83b3e69b0557ed3b2a5527fc96aa8484266f634aa55591468fb69ebbbb6f8b2d80f42539b3a4ece04ee675488fa77f161e53e9208a6e0b9b8e7cda2ea47f94f7175015fbf5c7edeea42b8b59", 0xb9, 0x4004090, &(0x7f0000000540)=@vsock={0x28, 0x0, 0x0, @my=0x1}, 0x80) sendmsg$IPVS_CMD_GET_CONFIG(r6, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1e1f5e497744369}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)=ANY=[@ANYBLOB="05000000be0c39787d5fbb27e85813a8b1413742f29e715201919b9fbabbec3a95ab425017d7f0ad854df2d26588bee7eeccf8f184395731e02b925ef0d955adb6108d5dea0e45cb87cc2193", @ANYRES16=r7, @ANYBLOB="10002cbd7000fedbdf250d00000014000200080005000104000000000500010000000100060007000000080004000101000008000600400d000008000400fdffffff1400020008000e004e20000008000300010000000800040003000000"], 0x64}, 0x1, 0x0, 0x0, 0x20008811}, 0x10) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:13 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0xa, 0x1) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) rt_sigreturn() setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) personality(0x5000007) ptrace$setregs(0xf, 0x0, 0x4, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x4, 0x2000) [ 357.251499] FAT-fs (loop7): unable to read boot sector 19:18:13 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000240)) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) r3 = gettid() sched_getattr(r3, &(0x7f0000000480)={0x30}, 0x30, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x159e00, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = accept4$packet(r6, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000400)=0x14, 0x100800) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000440)={0x0, r7, 0x401, 0x5, 0x6, 0x3ad}) 19:18:13 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 357.306094] FAT-fs (loop5): unable to read boot sector [ 357.315694] FAT-fs (loop11): unable to read boot sector [ 357.328242] FAT-fs (loop9): unable to read boot sector 19:18:13 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000000040)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000001c0)) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RCLUNK(r4, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000000140)) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:13 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x0) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)) write$input_event(r0, &(0x7f0000000280)={{0x77359400}, 0x0, 0xc2a}, 0x1da) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:13 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 357.527425] FAT-fs (loop11): unable to read boot sector 19:18:13 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 357.587512] FAT-fs (loop5): unable to read boot sector [ 357.650940] FAT-fs (loop1): unable to read boot sector 19:18:13 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) getsockname(r1, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000001c0)=0xffffffffffffffa7) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000540)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000580)={'tunl0\x00', r3}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:13 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f00000001c0)={0x1}, &(0x7f0000000200), &(0x7f0000000300)={r1, r2+10000000}, 0x8) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 357.681319] FAT-fs (loop9): unable to read boot sector [ 357.687442] FAT-fs (loop3): unable to read boot sector 19:18:13 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffffffff7ffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) faccessat(r1, &(0x7f0000000080)='./bus\x00', 0x183, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) write$P9_RREADLINK(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGSND(r6, 0x8040451a, &(0x7f0000000140)=""/189) [ 357.736806] FAT-fs (loop3): unable to read boot sector 19:18:13 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 357.829129] FAT-fs (loop5): unable to read boot sector 19:18:14 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 357.872896] FAT-fs (loop7): unable to read boot sector 19:18:14 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f00000002c0)=""/218, &(0x7f00000001c0)=0xda) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 357.897533] FAT-fs (loop1): unable to read boot sector [ 357.906506] FAT-fs (loop7): unable to read boot sector 19:18:14 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:14 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) write$binfmt_elf32(r0, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], 0x6e7) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:14 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sched_yield() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSETXW(r3, 0x5435, &(0x7f0000000180)={0x800, 0x1, [0x1, 0x57, 0x1000, 0x2a, 0x6], 0x354}) r4 = dup(r1) write$P9_RREADLINK(r4, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x200000, 0x8) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000140)=0x1000) [ 357.953797] FAT-fs (loop3): unable to read boot sector 19:18:14 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0xdd, 0x8, 0x6, "ebd0d3668b7d66e8468f1f537059347c", "5f8e027112869ff46a81bd670931fb0d793de5e49754ed0ab1b1b578115fdfeba4a7f096107d96b21d3fb95895bb251bab0e07691af7a6dc0e85f78e665e26fd2c666d7a9796a25eb8b4fd4d5b508fbad4a0baa83e850712345cf67babd9b1257c4cb2639563c67aa91934a760a5e01ac826b9181afdb7715b0da534c9146f1c8fd05686f34de06e5dde70066ea3e384adbe92a29322340e44c668c3fddc3f265fdd77338752d3c9776b6634d180fe9a03141efe49e2b112662461c6911e824ea2253d267e592778"}, 0xdd, 0x2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 358.044367] FAT-fs (loop7): unable to read boot sector [ 358.076976] FAT-fs (loop5): unable to read boot sector 19:18:14 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 358.136252] FAT-fs (loop1): unable to read boot sector 19:18:14 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:14 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfb9066541d657b97}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r1 = geteuid() r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000200)="7acb26f9ed41093ccaf8a1eb3ebc455fe701c7cbeec73659db1b45637b4111da4dee2f584dfd465e087dec4d52f4934a29aff662b0c67ef8e4a0a5346ab6b4a054ad47741fd9c0fffe42ec08154c323e8869b81805d2ed1d4f7c91f047e858985ccf3163fe99b639b919d76c3fd274f3d5fec896f3817f7697", 0x79, 0x3f}], 0x4000, &(0x7f0000000300)={[{@shortname_lower='shortname=lower'}, {@numtail='nonumtail=0'}, {@shortname_win95='shortname=win95'}, {@shortname_win95='shortname=win95'}, {@fat=@showexec='showexec'}, {@shortname_mixed='shortname=mixed'}], [{@fowner_gt={'fowner>', r1}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@subj_user={'subj_user', 0x3d, 'msdos\x00'}}, {@euid_lt={'euid<', r3}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'msdos\x00'}}, {@uid_gt={'uid>', r5}}, {@smackfshat={'smackfshat', 0x3d, 'em0keyringsecurity'}}]}) [ 358.198588] FAT-fs (loop7): unable to read boot sector 19:18:14 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='oom_score_adj\x00') ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000300)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_udp_int(r3, 0x11, 0x17, &(0x7f0000000340), &(0x7f0000000380)=0x4) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 358.225105] FAT-fs (loop3): unable to read boot sector 19:18:14 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:14 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:14 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x5) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:14 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 358.405583] FAT-fs (loop1): unable to read boot sector [ 358.415777] FAT-fs (loop7): unable to read boot sector [ 358.473673] FAT-fs (loop7): unable to read boot sector [ 358.473704] FAT-fs (loop3): unable to read boot sector [ 358.489611] FAT-fs (loop9): unable to read boot sector 19:18:14 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 358.613695] FAT-fs (loop1): unable to read boot sector [ 358.635982] FAT-fs (loop5): unable to read boot sector 19:18:14 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 358.708591] FAT-fs (loop9): unable to read boot sector 19:18:14 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:15 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000140)=0x1, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{}, 0x2, 0xc2a}, 0xfffffffffffffffe) [ 358.843552] FAT-fs (loop5): unable to read boot sector 19:18:15 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:15 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 358.893318] FAT-fs (loop9): unable to read boot sector 19:18:15 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x6, 0xb8, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) sendto$inet(r2, &(0x7f00000004c0)="30d194a5f9197dd496b5a1c3154ea39a7c48e0e92cadc1df6075c56f411a7c3d8896b297f0df32adac28069accd29f7bffcb38424fd103c195edeac78033c6513768ee2b76e19ce070681021ac54d448c4d91c8d0985f239745aa69a449a60bb8ef99f24ee3961b56fa9426b3ba9d02dd10823dcb003ba75be94d6e4d62f902f18909233e69aaa43783c15070b83536b65f85f5445aeea7d3a078ef5e288", 0x9e, 0x8000860, &(0x7f0000000580)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r6, 0x4c03, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_MD5SIG(r8, 0x6, 0xe, &(0x7f0000000600)={@in6={{0xa, 0x4e23, 0xd13, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8}}, 0x0, 0x8000, 0x0, "ec399f6f031948d6dbddda4df4fa917c801192ccc1216c972236891e2df93ff71ae1b2c367a3c3d8cd97536db3f26b0bb0da09e5f51ef9f1ac4d79d0714c7cfe15e2a908f1f9a61973f0368459ffaee4"}, 0xd8) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009d40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009d00)={&(0x7f0000001b80)=ANY=[@ANYBLOB, @ANYBLOB="000226bd7000ffdbdf2500000000", @ANYRES32=r3, @ANYBLOB="bc00020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="44000200400001002400010071756575655f69640000000000000000200000000000000000000000400000000800030003000000080004000100000000000000", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="3401020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040001000080080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400e300000008000600", @ANYRESOCT=r1, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040001000100400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000300000008000600", @ANYRES32, @ANYRES16=r5, @ANYRES32=0x0, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400fffbffff3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="f800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000410203000b0000004b0104000900000008000700000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f74785f686173685f746f5f706f72745f6d", @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005e0f000008000100", @ANYRES32, @ANYBLOB="c800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000000000080007000000000044000100240001006d6f646500"/98, @ANYRES32=0x0], 0x1d}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@newchain={0x38, 0x64, 0x10, 0x70bd28, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0x10, 0xc}, {0xb, 0x7fc3}, {0x5, 0x6}}, [@filter_kind_options=@f_cgroup={{0xc, 0x1, 'cgroup\x00'}, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x10) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r9 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) write$P9_RREADLINK(r11, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000005c0)={0x8001, 0xfe5a, 0xe, 0x5930, 0x4, 0x9, 0xfd, 0xd1, 0x7fc, 0x0, 0x1, 0x8000}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x5185, 0x7, 0x0, 0x1d, 0x1e, 0x18, "3b25826b790e94915a764b2921098c698df01e4db6973b80cad636cb44dd8a55c8595d6ec0f68c2c1deb08b2bb4c497664475b70829a765d3338cacecab33e6c", "a7d651c3545327cc0afc04d91ff68df5aecb7f42ce316b1086edd5daac5c21dd2bc158242fcb0e73fee66101bf0a7e9f9bbf2096abb34150292b7de0a9434755", "704dd222532d93957431e94c5cdf4d33d03436ee7b8498cee044a346b4061f99", [0x401, 0x5]}) write$input_event(r9, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 358.982670] FAT-fs (loop1): unable to read boot sector [ 359.000764] FAT-fs (loop5): unable to read boot sector [ 359.009404] FAT-fs (loop1): unable to read boot sector [ 359.044548] FAT-fs (loop9): unable to read boot sector 19:18:15 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:15 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) flistxattr(r1, &(0x7f0000000040), 0x0) 19:18:15 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 359.153061] FAT-fs (loop3): unable to read boot sector 19:18:15 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0xfffe, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:15 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 359.188241] FAT-fs (loop1): unable to read boot sector [ 359.204648] FAT-fs (loop5): unable to read boot sector 19:18:15 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) inotify_add_watch(r1, &(0x7f0000000040)='./bus\x00', 0x1) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 359.344743] FAT-fs (loop3): unable to read boot sector [ 359.369302] FAT-fs (loop3): unable to read boot sector 19:18:15 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:15 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 359.437231] FAT-fs (loop1): unable to read boot sector 19:18:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000008c0)='net/igmp\x00') setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, 0x0, 0xfffffffffffffe12) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x14) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r3, &(0x7f0000000140)={{0x0, 0x7530}, 0x3f, 0xc2d, 0x5}, 0x6) 19:18:15 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:15 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 359.582993] FAT-fs (loop9): unable to read boot sector [ 359.603896] FAT-fs (loop5): unable to read boot sector 19:18:15 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x4100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@ipv4={[], [], @broadcast}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) fcntl$getownex(r4, 0x10, &(0x7f0000000240)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$cgroup(r7, &(0x7f0000000340)='syz0\x00', 0x200002, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r11 = gettid() ptrace$setopts(0x4206, r11, 0x0, 0x0) tkill(r11, 0x3b) ptrace$setregs(0xd, r11, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001c40)={0x0, 0x0}, &(0x7f0000001c80)=0xc) r13 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r13) r14 = gettid() ptrace$setopts(0x4206, r14, 0x0, 0x0) tkill(r14, 0x3b) ptrace$setregs(0xd, r14, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r14, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001cc0)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000001dc0)=0xe8) fstat(r0, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = dup(r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup(r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r22 = dup(r21) ioctl$PERF_EVENT_IOC_ENABLE(r22, 0x8912, 0x400200) sendmsg$netlink(r1, &(0x7f0000001f40)={&(0x7f0000000180)=@proc={0x10, 0x0, 0x25dfdbfd, 0x10000000}, 0xc, &(0x7f0000000780)=[{&(0x7f00000003c0)={0x128, 0x16, 0x400, 0x70bd27, 0x25dfdbfc, "", [@nested={0x118, 0x8f, [@typed={0xc, 0x6d, @str='msdos\x00'}, @typed={0x4, 0xd}, @typed={0x18, 0x8b, @str='keyring[system-]em1\x00'}, @typed={0xc, 0x10, @u64=0x580}, @generic="efc4eb029292fd4140dd035a27165b8b80356e77060c1050507e257061e2f1c34a72fe2abf413635fd6962414a3d5c331d3226a6a00b9f99b796ca7e8581e3eb9c7c4e59f64dffd5707de56d2c06244110997b63f585dbf2188a9843fb27f91078d3a30487fcb3183730c362bc87f1fa4304d1268f7caa2dca732d67f81e8e1a3cc395cbc6db7dcdfba2167dd36354bed7c5933c14a01a3205172389390e0d9415e3d18a53a270097536af3c3584302c6dcd87ec1b37208a86ee557d94e53f06a1f3ef11420fe88cb80fbe09d1deff893acc68089cc71e1a59f8307366fd8e4c"]}]}, 0x128}, {&(0x7f0000000880)={0x1140, 0x1e, 0x800, 0x70bd27, 0x25dfdbfd, "", [@nested={0xd8, 0x4a, [@typed={0x8, 0x7f, @uid=r2}, @typed={0x14, 0x67, @ipv6=@dev={0xfe, 0x80, [], 0x23}}, @typed={0xc, 0xe, @u64=0x1ff}, @typed={0xc, 0x41, @u64=0xf1}, @generic="78aec38ce76ea55fe4d70da99135a87573e1e91f1f039ddf5c20282a6a7b2f77277f9d04800b9e85c886271140c2d03fe6e4b6318e26ba085eae332d5af2a6b0d21b68fa38560e63bc1c6fe0964ce864f48ddf8070681834cf817f62b48562573e87359fad015a3953c110275a36a70fc630f7c9f075103966e2d6a289c06e2255ef9c154460068dbac1810636956fb1eb77fa68f70636c47c9732a01d"]}, @typed={0x30, 0x43, @binary="c8426f983d5cce4c422423bac0b73b924e02427008298097b251684e86e00f9047ffe9278e922679a1"}, @nested={0x1028, 0x8e, [@generic="39de7c1b2f7ebf4ff750a4bfb977d95a7c35944a93", @typed={0x4, 0x5f}, @typed={0x8, 0x3d, @u32=0x3a}, @generic="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"]}]}, 0x1140}, {&(0x7f0000000600)={0xcc, 0x11, 0x10, 0x70bd29, 0x25dfdbfe, "", [@nested={0xbc, 0x46, [@typed={0x8, 0x7ff, @pid=r3}, @generic="0c52b3476cff61c63f869a8f275c8f5813e10c4ef3a944c320dff41da5b56c195e33546d5ae44161d232427e5d7ded80512fc6ca4174f3444c7ceb7d238fadc735bc1cb2ecda947c0007bb817a682f3f6edcc6c8bb6aaba02c1ba53dbcd160c18d7c50e3c865902fa10e4f1a18018202a2c93bb1745c504f1413855a0e562663de08ef26639c4f75cdb05807002fdfb26756d5c4cd5b2055e28c304666e1a3187f28bb93dc8cebae4e93e012c9"]}]}, 0xcc}, {&(0x7f00000002c0)={0x54, 0x27, 0x10, 0x70bd25, 0x25dfdbfc, "", [@generic="69b81b658dfcbc6183553c94864c0363dafd94061b5d31c6349f144703af08a1fe55682f40977914afb251bae38f8c428cfbdb599b1dc81bc94b1a842c9fb5cfd0"]}, 0x54}, {&(0x7f00000019c0)={0x278, 0x20, 0x400, 0x70bd2c, 0x25dfdbfd, "", [@nested={0x268, 0xf, [@generic="26a779fe3d9d2aad8d14c58211f4b4de19a554c3d4d15961d6b6abbb55a5752be25c67533f21636d5548f7fa5f3f4f0402b0ba7730ee424c78defb8559ed8a4db0f057e4c4165d119feff6b8592d90d8dca61e370765d9f94b494d1b653c0a85f19fdd592a27a41bd8eb95", @typed={0x8, 0x54, @u32=0x9}, @typed={0x8, 0x23, @pid=r5}, @generic="1344ce77d431e360d1c4b05bdbd781a3a78705ed74345a743d3415b8159e784792db4f0b75f2b6c46b4ccb5c031a35aa9f7c96539f632abf961de8675e1eda5d29456a9bc26dd279eb94d8c4e5eb8f8b09a0c2a60344a1a7e65383d4c2ed694ed7e6ceb641270ecbd2daeb7e4d4d3f85f352a6473550e120f57be4292ef8ba2b74faf7242cd8fcb72b4d6ee9a0d3d01889ec2fa3a72e65303970793a9c6ec2f70e25d90bbe04efc317e6378df054818ecb88344297038f41af232b6515b0643f26527b90cdf190c1a46f753f96a49187b3ccd68b5739ccb509bd45e4b0d84877819718f9796110f74aa540", @generic="5c75e35671f3dc4495bf78907b7b9a38bd084f504065c9804ebf267591f78f059f561c4cfefce418bb07099586573aca2ed29bbd05e7df09787166ac70b312aa89b479b7da6d927a16ee1b8923673cbac28094f6c76b5243a8604e43f8fda2c75ff6f7932e1371cbef47e963258745496a13d31c5a8198a20362fc6f212c6d6f4c46e3d676e7e924efd227f7e23fc53634e9cc59c188aeee808ceb9926f2735963c17440cea1c07dfea94c7efdf66e7aefbf9960575c0695a71924a854b075cdb36c1864de54eb08971ff016f0277bad88029e938a45f61bfe969adb0ab950805e8ff815e69993dfa77f416ef60c670b05af9ae56992bbcfbc", @typed={0x4, 0x1d}]}]}, 0x278}, {&(0x7f0000000700)={0x60, 0x28, 0x2, 0x70bd25, 0x25dfdbfc, "", [@generic="81b8a7032eb0852c813b701402ac68cbf557b763f7210846d2c46b230718d74866434dab42fa6092d18adfda599f404bd7c29a432c5127f6fcb7a3ab02f70ebee8ce372ed55bb2723bc60a034555"]}, 0x60}], 0x6, &(0x7f0000001e80)=[@rights={{0x20, 0x1, 0x1, [r8, r0, r9, r10]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @rights={{0x24, 0x1, 0x1, [r18, r0, r20, r0, r22]}}], 0x88, 0x44}, 0x40) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r23 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000080)='./bus\x00', 0x118) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r24) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r23, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 359.700193] FAT-fs (loop1): unable to read boot sector 19:18:15 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x4, 0x71, 0x3, 0xff, 0x0, 0x0, 0x80000, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0xd, @perf_config_ext={0x2, 0x1ff}, 0x2, 0xffffffffffffffff, 0x2, 0x8, 0x1fe, 0x9, 0x4}, 0x0, 0xc, r1, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000002c0)={0x8, {{0xa, 0x4e20, 0x2, @mcast2}}, 0x0, 0x7, [{{0xa, 0x4e23, 0x0, @rand_addr="fb33a8fb0e5ae7e75c61c9c1da22d1b5", 0x9}}, {{0xa, 0x4e24, 0x4, @remote, 0x7fff}}, {{0xa, 0x4e21, 0x7, @loopback, 0x6}}, {{0xa, 0x4e23, 0xffff, @remote, 0x100}}, {{0xa, 0x4e23, 0x8, @empty, 0x40}}, {{0xa, 0x4e20, 0x0, @empty, 0x1}}, {{0xa, 0x4e22, 0x9, @mcast2, 0x1}}]}, 0x410) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f00000001c0)=0xbb7b, 0x4) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:15 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:16 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./bus\x00', 0x800, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/status\x00', 0x0, 0x0) write$UHID_INPUT(r0, &(0x7f0000000880)={0x8, "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", 0x1000}, 0x1006) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000680)='msdos\x00', 0x1000001, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000200)=0x3) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2d, &(0x7f0000000040)=0x1, 0xfffffda3) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x402100, 0x0) write$P9_RWALK(r2, &(0x7f0000001cc0)=ANY=[@ANYBLOB="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"], 0x16) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r1, &(0x7f0000000280)={{0x77359400}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3b) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4}}, &(0x7f0000000600)=0xe8) r7 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)=0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r13, 0x0) r14 = getgid() r15 = gettid() ptrace$setopts(0x4206, r15, 0x0, 0x0) tkill(r15, 0x3b) ptrace$setregs(0xd, r15, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r15, 0x0, 0x0) r16 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r17, 0x0) stat(&(0x7f0000001c80)='./bus\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r19) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r22 = dup(r21) ioctl$PERF_EVENT_IOC_ENABLE(r22, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r23) r24 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r24, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r25 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/mls\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r27 = dup(r26) ioctl$PERF_EVENT_IOC_ENABLE(r27, 0x8912, 0x400200) r28 = socket$nl_generic(0x10, 0x3, 0x10) r29 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r29, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r30 = socket$netlink(0x10, 0x3, 0x2a8c774f73c2d5a9) r31 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r31, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r32 = syz_open_pts(0xffffffffffffffff, 0x402000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r33) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001ac0)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000780)=0xe8) r35 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r35) r36 = gettid() ptrace$setopts(0x4206, r36, 0x0, 0x0) tkill(r36, 0x3b) ptrace$setregs(0xd, r36, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r36, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r37) getsockopt$sock_cred(r37, 0x1, 0x11, &(0x7f00000007c0)={0x0, 0x0}, &(0x7f00000019c0)=0xc) r39 = getpgrp(0x0) getresuid(&(0x7f0000001a00)=0x0, &(0x7f0000001a40), &(0x7f0000001a80)) r41 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r41) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r43 = dup(r42) ioctl$PERF_EVENT_IOC_ENABLE(r43, 0x8912, 0x400200) sendmsg$unix(r2, &(0x7f0000001c40)={&(0x7f0000000340)=@abs={0x3, 0x0, 0x4e24}, 0x6e, &(0x7f00000004c0)=[{&(0x7f00000003c0)="8417f0f521ce22b841adc56eb741b5b3bfbe7227f6c4a3ea1cde69da07712e8067eead07d63a1019eb39dee2e6033d284230e803e74bf7559004252e5dee1907a2c9f6c6b1875d05e293d1266a7f9e2cbba6ad0c68dbbb624f031682a7b0f3ca281bd24581ad02ae18475ac63cedc583ab6c7e89965d2c1f34b8075198262054110d36bae6fb5ebb35b05792c86338a5b31d99a03e82f6eb36bd5e4ba04457d3d82377dcab99a2de93e07d946a757b8338bd4cf4c28f6da39d9cb8bb0cba6f969eed0dbd1ba5b196f21abae4ee9908e31b6d37a60cf39e4376801218276d1c129c7efcc02894a9f95fd2c9c8f4d848043d43ec", 0xf3}], 0x1, &(0x7f0000002040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRESOCT=r43, @ANYRES32=r10, @ANYRES32=r0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r13, @ANYRES32=r14, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r15, @ANYRES32=r17, @ANYRES32=r18, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25, @ANYRES32=r27, @ANYRES32=r28, @ANYBLOB="38000000000000000100000001000000", @ANYRES32=r1, @ANYRES32, @ANYRES32=r29, @ANYRES32, @ANYRES32, @ANYRES32=r30, @ANYRES32=r31, @ANYRES32=r32, @ANYRES32=r33, @ANYRES32=0x0, @ANYBLOB="1c00000000b0240000000000820000004103ab36b14bc187e01f301b54e338463c00da6b6f15a96c135566e6617e7c5b38a6baef58cc4c87d38f5b7f42780ddf8d27b64ceba6255b0fd38c3e2cc24c2c50d400c62f71156c8ac9d744bd746dd67ea911116cdc1fc2a611132df2a79bcb042a70", @ANYRES32, @ANYRES32=r34, @ANYRES32=r35, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r36, @ANYRES32=r38, @ANYRES32=0xee00, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r39, @ANYRES32=r40, @ANYRES32=r41, @ANYBLOB='\x00\x00\x00\x00'], 0x1be, 0x4}, 0x20000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000002c0)={0x200, 0x3, 0x77073c0, 0x2}, 0x10) [ 359.748455] print_req_error: 71 callbacks suppressed [ 359.748462] print_req_error: I/O error, dev loop9, sector 0 [ 359.751594] print_req_error: I/O error, dev loop5, sector 0 [ 359.755021] FAT-fs (loop9): unable to read boot sector [ 359.770664] FAT-fs (loop5): unable to read boot sector 19:18:16 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:16 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6653a8990785363940aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb0353cffd7a7c0c92465e5f9cc2d3fbf0322168078aba9d7ae45b0051a1221af2772a9567bb821942ce72590f1bf41d20d4c000000279bd612811df1fcaa94a96d58db92af7f9298918ae95b745777a1968e48d463", 0x84}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe04, 0x0, 0x0, 0x0, 0x22c}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e0000e0d4025a37ff03a8627573"], 0xe) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x6e) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r6, 0x0) getresgid(&(0x7f0000000240), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) fchown(r4, r6, r7) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000080)={0x7, 0x1, 0x100, 0x20, 0x16, 0x8, 0x6, 0x81, 0x0, 0x400, 0x7, 0x9}) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) [ 359.920637] print_req_error: I/O error, dev loop1, sector 0 [ 359.928495] FAT-fs (loop1): unable to read boot sector 19:18:16 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 359.962223] print_req_error: I/O error, dev loop5, sector 0 [ 359.969430] FAT-fs (loop5): unable to read boot sector [ 359.977469] print_req_error: I/O error, dev loop9, sector 0 [ 359.983683] FAT-fs (loop9): unable to read boot sector 19:18:16 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:16 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) r2 = gettid() r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r4, 0x0) r5 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r5) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x3b) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) r7 = getgid() sendmsg$netlink(r1, &(0x7f0000000240)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbfc, 0x40082}, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000180)={0x3c, 0x23, 0x20, 0x70bd26, 0x25dfdbfc, "", [@generic="33ec579122dd4edaf508d5b9ffa332e262ef0cf2d86971", @typed={0xc, 0x83, @str='msdos\x00'}, @typed={0x8, 0x91, @ipv4=@multicast2}]}, 0x3c}], 0x1, &(0x7f0000000200)=[@cred={{0x1c, 0x1, 0x2, {r2, r4, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xffffffffffffffff, r7}}}], 0x40, 0x4000002}, 0x8080) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 360.026922] print_req_error: I/O error, dev loop3, sector 0 [ 360.034157] FAT-fs (loop3): unable to read boot sector 19:18:16 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) setxattr$security_evm(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000500)=@v2={0x3, 0x1, 0x7, 0x7, 0xfd, "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"}, 0x107, 0x1) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)=0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000140)=r2) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) write$P9_RREADLINK(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:16 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) epoll_create1(0x100000) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:16 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 360.164906] print_req_error: I/O error, dev loop5, sector 0 [ 360.172586] print_req_error: I/O error, dev loop1, sector 0 [ 360.178976] FAT-fs (loop5): unable to read boot sector [ 360.184843] FAT-fs (loop1): unable to read boot sector 19:18:16 executing program 4: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 360.228858] print_req_error: I/O error, dev loop9, sector 0 [ 360.236236] FAT-fs (loop9): unable to read boot sector [ 360.253843] print_req_error: I/O error, dev loop3, sector 0 [ 360.260620] FAT-fs (loop3): unable to read boot sector 19:18:16 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000180)=0x6e) bind$unix(r0, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e54b35500000017010005002e2f"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r3, &(0x7f0000000140)={0x2, 0x4e22, @loopback}, 0x10) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGWINSZ(r5, 0x5413, &(0x7f0000000080)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 360.330388] FAT-fs (loop7): unable to read boot sector 19:18:16 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000180)={'hwsim0\x00', {0x2, 0x4e23, @loopback}}) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_int(r2, 0x0, 0x1, &(0x7f0000000140)=0x3ff, 0x4) statfs(&(0x7f0000000040)='./file0\x00', &(0x7f0000000880)=""/4096) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000001c0)=""/56) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:16 executing program 4: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 360.459671] FAT-fs (loop9): unable to read boot sector [ 360.473446] FAT-fs (loop3): unable to read boot sector 19:18:16 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x4, 0x4) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000200)=0x7fff) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 360.522543] FAT-fs (loop3): unable to read boot sector 19:18:16 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0x0, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:16 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) inotify_add_watch(r1, &(0x7f0000000140)='./bus\x00', 0x144) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f00000002c0)={@loopback, 0x4b, r7}) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 360.585366] FAT-fs (loop1): unable to read boot sector 19:18:16 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f00000001c0), &(0x7f0000000200)=0x4) fsetxattr(r0, &(0x7f0000000040)=@random={'os2.', 'msdos\x00'}, &(0x7f0000000140)='msdos\x00', 0x6, 0x7) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) eventfd2(0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:16 executing program 4: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 360.683691] FAT-fs (loop9): unable to read boot sector 19:18:16 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_group_source_req(r2, 0x29, 0x2c, &(0x7f00000004c0)={0xbd000000, {{0xa, 0x4e20, 0x5, @rand_addr="b7eb9a206c536125a9b4d2648e21e589", 0x20}}, {{0xa, 0x4e24, 0x1c, @loopback, 0x1ff}}}, 0x108) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0xcc, r5, 0x30c, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NODE={0x48, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x336a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7ff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x800}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x7348bf8c91037520}, 0x4800) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 360.747026] FAT-fs (loop3): unable to read boot sector [ 360.754097] FAT-fs (loop7): unable to read boot sector [ 360.776805] FAT-fs (loop5): unable to read boot sector [ 360.783832] FAT-fs (loop1): unable to read boot sector 19:18:17 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x14800, 0x10) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x3) syncfs(r0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:17 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000340)=0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x2}, r3, 0xffffffffffffffff, r1, 0x8) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000200)={0x12, 0xd, 0xd, 0x14, 0xa, 0x7, 0x1, 0x5b, 0xffffffffffffffff}) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0xfffd, 0x0, @remote, 0x3}, 0x1c) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r5, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f00000004c0)='\x00', 0x2000, 0xc4) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r8, 0x4c03, 0x0) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009d40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009d00)={&(0x7f0000001f80)=ANY=[]}}, 0x0) sendmmsg$inet6(r6, &(0x7f0000000e00)=[{{&(0x7f0000000500)={0xa, 0x4e22, 0xb40, @rand_addr="9aa6a0a46aaf05a765aee8e319dab2cf", 0x80}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000540)="5133cfa5f598d29ff7815ea087663dd0cf8d5390e433a7de2bd6bb7fc92f4abef21ab8bf937b74ef71f2943be82720911e5d9ee000cefaf9ee84bf75e29b4f0b076029fb4984e1bc9a8923ab908a37a069246d3a5f59ebc189f9826ec4e5272365d81b33f5b7ff5c69506385c2bbe7d160383494759b29fa1f", 0x79}, {&(0x7f00000005c0)="0253af83d2", 0x5}, {&(0x7f0000000600)="f9c57afe8b1f9cdfeb9cb05897065c784d50fbd163477c3a1c77e5a9a586d29e1d5318c07fff8615cc47f41154c1ef3cc31003a13dbb582619d20c7111b3ff2a9715c02f2e0cbf5c8e144af79df474402c8b01e8b30d07ed1af2908d063882", 0x5f}], 0x3}}, {{&(0x7f00000006c0)={0xa, 0x4e20, 0x2, @mcast1, 0x6}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000700)="f330c099b2540f0e72ce3597b901a7f3db6351031acac4f918631b3366a24a36762006c07384532ab2e35021b9c96f10d30116d6b64279fa018dc9c16094e066948f281505362e8ff6ab2f5a58b3080308494b9920eed9f02f99c058c3d61faf0f15ab3cf4bdf291", 0x68}], 0x1}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000007c0)="c4185bb7632c032285b78220273fa7cf70db94c60e5302f54aee", 0x1a}, {&(0x7f0000000880)="fb8d3bdb809eecba2b26270dca240b3b97283490c5dfc1b1e807b1c88e194b495a042b8711797a", 0x27}, {&(0x7f00000008c0)="815099d3ab4cbc000b63f5ce9530b0416ad5256842daa01a53c3764ab95dec5dcca6316afaf391c82afa781a84af8d56f6599ad7f40bf2d192135b84a0b96585fe74c066f7bc5b93c30b58867726708487acb61d0adc31133f4b9fa635bfdf66d5e8602a2a0982a66900b310f700e39d9848fc87db1ecf507f4c7ebc0052d195b5aa5b621899f582db9038b6b6350f51a918529b336a66ca44e50df93e11f91e11e15fced5f4a878b35bfdce55c5ea53be7fe5c86c60504534bf3776527b0b811083764cda09ae41ec9a8d48a6755647bbe11832f60f99313c0a5903b4572cb0a0d64bbc4727", 0xe6}, {&(0x7f00000009c0)="b1be1bedf8c28b4f22574e06c7d5214ce0214f16621b0c74eb28e8050cd25386994cf7a09efadd02b44651d308b60c639026b1b66790e976fe4bc0923cfa015858c6cafa3c2f15cf2ca0f7e4", 0x4c}, {&(0x7f0000000a40)="650ae614cbdd4694b36fa7ebd2c66e394dcd2fd26a4a5eec579c91147eb73c5b1ad8d8a07b897a3173c36fc620ab19ec6b656572b2a6d19366008075ea59388e66c68fc75aef9dd811d9758888c4d2dc586c66714d8d590a174321ac5e13ad773bfcc9bbd2b570613416d420986fbc94333716ce92f066092d83b095668ef64f6b8fbf4ed16f90af4cd6e201fbd3039a7caae03e36c6005eacc267c66d93d21e52c09ba41e5db8d041bd6ee2f357a47a", 0xb0}], 0x1000010d, &(0x7f0000001200)=ANY=[@ANYBLOB="20000000000000002900000037000000938ac12a417503d55ede4d0000000000000000be00000000000024000000000000002900000032000000d15cf5cc8b0a", @ANYRES32=r7, @ANYBLOB="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"], 0x258}}], 0x3, 0x4000014) 19:18:17 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 360.914696] FAT-fs (loop9): unable to read boot sector 19:18:17 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 360.937615] FAT-fs (loop7): unable to read boot sector 19:18:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0xff52) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x80040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 360.993590] FAT-fs (loop3): unable to read boot sector [ 361.010853] FAT-fs (loop1): unable to read boot sector 19:18:17 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 361.126500] FAT-fs (loop5): unable to read boot sector 19:18:17 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:17 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) r3 = open(&(0x7f0000000080)='./file1\x00', 0x8000, 0x20) getsockopt$inet_mreq(r3, 0x0, 0x20, &(0x7f0000000140)={@multicast2}, &(0x7f0000000180)=0x8) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 361.163239] FAT-fs (loop9): unable to read boot sector 19:18:17 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) mount(&(0x7f00000001c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='configfs\x00', 0x1850002, &(0x7f00000002c0)='msdos\x00') ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 361.272763] FAT-fs (loop1): unable to read boot sector 19:18:17 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 361.305043] FAT-fs (loop5): unable to read boot sector 19:18:17 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 361.368474] FAT-fs (loop3): unable to read boot sector 19:18:17 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f00000001c0)=0x4, 0x4) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:17 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept$inet(r0, 0x0, &(0x7f0000000080)) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000140)) r3 = dup(r1) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 361.412467] FAT-fs (loop7): unable to read boot sector [ 361.418590] FAT-fs (loop3): unable to read boot sector 19:18:17 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 361.512361] FAT-fs (loop5): unable to read boot sector 19:18:17 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000180)={0x0, @remote, @multicast2}, &(0x7f00000001c0)=0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@mcast1, @ipv4={[], [], @remote}, @dev={0xfe, 0x80, [], 0x18}, 0x726, 0xad43, 0x8, 0x80, 0x0, 0x20000, r3}) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0xffffffcd, 0x0, 0xc1, 0x0, 0x0, 0x0, 0x10000050a, 0x6400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x94}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 361.635037] FAT-fs (loop3): unable to read boot sector [ 361.651370] FAT-fs (loop9): unable to read boot sector [ 361.671243] FAT-fs (loop3): unable to read boot sector 19:18:17 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 361.702780] FAT-fs (loop1): unable to read boot sector 19:18:17 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xffffffffffffff77) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x803, 0xa0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x30, &(0x7f0000000200)={{{@in=@broadcast, @in=@remote}}, {{@in6=@mcast1}, 0x0, @in=@local}}, 0xe8) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000040)='./bus/file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 361.762525] FAT-fs (loop5): unable to read boot sector 19:18:18 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:18 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x23, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:18 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) ioctl$SIOCGIFHWADDR(r4, 0x8927, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) preadv(r6, 0x0, 0xffffff7f, 0x9) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) [ 361.949479] FAT-fs (loop9): unable to read boot sector 19:18:18 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 361.990941] FAT-fs (loop3): unable to read boot sector [ 362.010517] FAT-fs (loop7): unable to read boot sector [ 362.021287] FAT-fs (loop5): unable to read boot sector 19:18:18 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:18 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) creat(&(0x7f00000001c0)='./file1\x00', 0x2) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) statx(r2, &(0x7f0000000200)='./file0\x00', 0x2000, 0x1, &(0x7f00000002c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:18 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@get={0x1, &(0x7f00000002c0)=""/152, 0x8}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:18 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 362.250529] FAT-fs (loop5): unable to read boot sector [ 362.260099] FAT-fs (loop9): unable to read boot sector 19:18:18 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:18 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/34, 0x22, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x49, @local, 0x6408d806}, 0x1c) exit(0x10d1a9b7) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000002c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f00000001c0)={'broute\x00'}, &(0x7f0000000240)=0x78) 19:18:18 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 362.522255] FAT-fs (loop9): unable to read boot sector [ 362.522958] FAT-fs (loop5): unable to read boot sector [ 362.679798] FAT-fs (loop7): unable to read boot sector [ 362.753845] FAT-fs (loop9): unable to read boot sector 19:18:19 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$void(r1, 0x5450) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:19 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, 0x0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:19 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0xfc, 0x8, 0x6, 0x8, 0x0, 0x101, 0x100, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_bp={&(0x7f0000000000), 0x14}, 0xf9a7e0407fc8829c, 0x61dc, 0x10001, 0xc, 0x3, 0x1}, r1, 0x2, r0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) write$P9_RREADLINK(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 362.860113] FAT-fs (loop5): unable to read boot sector [ 362.980967] FAT-fs (loop9): unable to read boot sector 19:18:19 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:19 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 363.033308] FAT-fs (loop1): unable to read boot sector 19:18:19 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$input_event(r1, &(0x7f0000000400)={{0x0, 0x7530}, 0x17, 0x2, 0x1ff}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) faccessat(r3, &(0x7f0000000440)='./file0\x00', 0x120, 0x400) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) setxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="00fbe30108ae08d954fae9ddc7403e9b5359ff38ced062b1e175b7500d200a627e379584c4622eeed3bc05e954615c545952453c28be4e1bd40004b00e15b905c1a686c775a2baae4e3c24d1846a93c67d1b5ca881584611a7539577f7acfc9b2c83f0954bb78ca85b80301e38e0d947bfe593dceef3e2bfd92c2bd9e23553738155da8168b8595eef98519b5fc7a496d71e1934e96b97faaee594e99001a7f91ffbcfce73cfb4a05915aa5dbfc81db6228c13d86e505f849a1f3f0097ca8f56b77fee1f571520c4046397bca2b5d067823f784e71a56e14d68d3f096502277a090b6d66b9e910d7eac4691f"], 0xe3, 0x1) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x5, 0x3ca4}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x200040) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f00000001c0)={r7, 0x0, 0x81, 0x9, 0x6}) 19:18:19 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) execveat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='msdos\x00'], &(0x7f00000004c0)=[&(0x7f0000000200)='msdos\x00', &(0x7f0000000240)='msdos\x00', &(0x7f00000002c0)='eth1bdevppp0{cpuset\'^em1wlan1\x00', &(0x7f0000000300)='msdos\x00', &(0x7f0000000340)='msdos\x00', &(0x7f0000000380)='msdos\x00', &(0x7f00000003c0)='msdos\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='msdos\x00', &(0x7f0000000480)='msdos\x00'], 0x100) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:19 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 363.149553] FAT-fs (loop7): unable to read boot sector [ 363.167928] FAT-fs (loop9): unable to read boot sector 19:18:19 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:19 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x0, 0x70bd26}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0xe52b70ef39e298d6, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x24012044) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setflags(r4, 0x2, 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)=""/91, 0x5b}], 0x1, &(0x7f00000003c0)}, 0x2}, {{&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000a80)=""/4096, 0x1000}], 0x1}, 0x5}], 0x2, 0x40000000, &(0x7f0000000600)={0x77359400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000002140)={@empty, @remote, 0x0}, &(0x7f0000002180)=0xc) bind$packet(r5, &(0x7f00000021c0)={0x11, 0x11, r8, 0x1, 0x7f, 0x6, @local}, 0x14) 19:18:19 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 363.245403] FAT-fs (loop5): unable to read boot sector 19:18:19 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) accept4$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14, 0x41800) sendmsg$nl_route(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x204400}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=@bridge_getlink={0x20, 0x12, 0x4, 0x70bd2a, 0x25dfdbfd, {0x7, 0x0, 0x0, r3, 0x400, 0x80}}, 0x20}}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 363.288696] FAT-fs (loop3): unable to read boot sector [ 363.302911] FAT-fs (loop3): unable to read boot sector 19:18:19 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000040)={0xa, 0xfffd, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3}, 0xfffffffffffffd21) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r1, &(0x7f0000000280)={{0x77359400}, 0x15, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDGKBENT(r4, 0x4b46, &(0x7f0000000340)={0x9, 0x40, 0xff9a}) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RXATTRWALK(r8, &(0x7f0000000240)={0xf, 0x1f, 0x1, 0xbb}, 0xf) sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="f2d7949a", @ANYRES16=r6, @ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x10001000}, 0x80) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:19 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 363.374492] FAT-fs (loop7): unable to read boot sector [ 363.393915] FAT-fs (loop9): unable to read boot sector [ 363.505871] FAT-fs (loop5): unable to read boot sector [ 363.530374] FAT-fs (loop3): unable to read boot sector 19:18:19 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:19 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 363.552725] FAT-fs (loop3): unable to read boot sector [ 363.567604] FAT-fs (loop9): unable to read boot sector 19:18:19 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0xfd) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@mcast2, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e20, 0x0, 0x4e23, 0x0, 0xa, 0x80, 0xa0, 0x3a, 0x0, r5}, {0xff, 0x100000000000000, 0x3, 0x4, 0xfffffffffffffff9, 0x2, 0x8, 0x7}, {0x6, 0x1000, 0x4, 0x3}, 0x8, 0x6e6bb9, 0x0, 0x3, 0x2}, {{@in=@multicast2, 0x4d3, 0x32}, 0x53b410edca50adf6, @in6=@mcast1, 0x3502, 0x0, 0x4, 0xd3, 0x2, 0xffffffff, 0xff}}, 0xe8) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r7 = add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r8 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r8) keyctl$chown(0x4, r7, 0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = gettid() ptrace$setopts(0x4206, r11, 0x0, 0x0) tkill(r11, 0x3b) ptrace$setregs(0xd, r11, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r11, 0x0, 0x0) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r13, 0x0) r14 = gettid() ptrace$setopts(0x4206, r14, 0x0, 0x0) tkill(r14, 0x3b) ptrace$setregs(0xd, r14, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r14, 0x0, 0x0) r15 = getpgrp(r14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) r17 = gettid() ptrace$setopts(0x4206, r17, 0x0, 0x0) tkill(r17, 0x3b) ptrace$setregs(0xd, r17, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r17, 0x0, 0x0) r18 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r18, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r20, 0x0) r21 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r22, 0x0) fstat(r6, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r10, &(0x7f00000062c0)={0x0, 0x0, &(0x7f0000006200)=[{&(0x7f0000000880)={0x3740, 0x3b, 0x4, 0x70bd25, 0x25dfdbfd, "", [@generic="538d88a6109429b903429c37913324cdaef55659761b0f2c9de112ba7de3d9ddacca3a7ea2fe1a07cec33620658c42a93f1c6179035f49468faec6d1db08a8da", @nested={0x240, 0x53, [@generic="8411e73346b03647f9e05dd1fc4e56cd264d7762b29b24fa9d9dd5cc2ab82f58c18488c86b34114e7f59081a7046b3f91823061a2f83329a8fe417efa84a397cc75ff260676cdae2b20dff0d2710df30e662c3eaea4293f6a69dafcb9a23252fd7f2b1103c741d3eb7f956b87799a23f785e93949d5e574581738f2405087fbdccbc26da06dbeded65b37ad7b6eb4a23e32cb97386a187d8cd", @typed={0xac, 0x5f, @binary="a63efbf3991f07ab834d5d13819efc6e5ef56922b608802d3e41d8899780efd3be824da761225b25863e86c1ea97ebb85a32a8c14be7c7029f539cc74284ff95781b4725f860cf32a41938302393408cfa56e5d6c578dae49024f07328dd5072a8816a0169d8f585c248b6ab9296e619321261960fa567af660de6765551128914144ba5fdef9ee1a09e3609b3d0c356617fe2b0b6e35482880d688a6145bd00281fdaf40dd8bb"}, @generic, @generic="bd82a0ac066498f06a898e1cac5d139d7870e3d4cbd5d15c7214a60772ebb13ade1e3103ae5ec249785033db5f75250af77c6f0aeb1c09b7584a85a81b9dbb03dc2bc29a3d677573ad81da0be2c452d7e8c44dd64403e405212715a9a510dd9f0fbe5656545389bad71613092239c92bbcf82fcaa710347687ca7f195af7724a9ee1989383e81b181ae506cf6af832730229e92b6f426431a43c98f04ef64ca082d63582b311905c2aa58e8031e253178a883101be41a2929244885a3c654301b1836107d13a6d44050f86b9e71665a1e8f05c34413eff78225fe49340ea924090d0b4882e1b19683410036de34776251549c6b5ab"]}, @generic="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", @typed={0x8, 0x8a, @pid=r11}, @nested={0x1188, 0x4a, [@typed={0x8, 0x26, @uid=r13}, @typed={0x8, 0x8e, @u32=0x7f}, @generic="8e812a14d8473f41c5ccc5b56c4ad5f3a2249e8b037065abdd0e16a4a663df333fb9ab5c76d889e46c302c2f6a4262451f37bdc3804530cb89aa4769bbd82c3c82b6dc9b09113752de69fedcb6eed8381af5137f3d93024b60e01065fad6422d4fedd105f8c64b4da447df04f85b5877199d32f45e476fff19f5c658002b228acae28e383ea13f342a9f5b4e6d582d68fdeb0fa73b0f1e0f2e98e2972f624f57ffe0232760eb47ad3adb772f5ce1178986032ca0f040bacd61faef7590ab0d8b00dfecfbbe6d52c02324d45a89ad6bec433a723cb912f7ed700a422ad024b234f5784ba20d764c90626d09d9", @typed={0x8, 0xc, @u32=0x6}, @generic="3dba23136eb9537b53d3c7beb97c7ec78fd8c5436e123b69a36d37dc21002b8afa305f36dbf257b606d28ea01aeb5b71f871b8674342e115ce3e5864ff3ac334142b9c440d0f52b97975f9ed03a086c2a705b527c4f1957ece7410e6768648bc4994824f62c129afa46e9962dba6c5e66421e9131b32d828b05e46146b", @generic="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"]}, @nested={0x1320, 0x84, [@generic="d679cd99b8415017d5c91e40380104822e7d71cf6781b1eb5e14c96964644facedd7fc2c44b9dd052b2bf5f623d9b6a04f3feaa849038801e5703220588a6deb1c42cfc0365a9320e3787efdf1a710f969ea553604fd8591117cbe33b7e67e1368bddda9da667cae7dcd28515a035713f6d2c085eb42a39e5fb4e60534dd7c488bfeafe9ed3e80b2ba4e09549f5cf90780dc8f0219da09cfe78010990d39d12dc34e82d2d270ce58981945976fd876474c6809a42351e24638683944b7a383100656b725f26354a9c3f3934942c6421656fa3a8b5f4656b3", @generic="aa7c138723036f46367119c85c325a55c3f3922e3a205a3d5b3f59f7e4f03b3980b8051b533df0ad9e93dc3fbb36b25a7b330f433a3d2cff59691b8ef1169d8d10a1e852e047534dbe02c5eb03e96334bbbc8ecebcb54fefd878df51edad5241fc59bff9c0c9cfc357b2fda88813eb04cb6729071c8c7914389a0c0309a9123e60482355a39ab44fd834dffe6b17a5aa4e3251000fcab4b20ba2355e6497601f80ecb6978c4d69da5e8b637d4a6434096eb3573e4677a321eccb06c880fb659a13f877d0a76380e4fc4b32aa21d931c314be3bc1376cb06e", @typed={0x4, 0x89}, @generic="a2bbd089251f2518f0911949c4e4fddc893fba6f4a9482ed35ed8b1cf77819edc13493027840d08f93321bec7f0a97722d344ffb128a0e2ed3834fd287a044f36a2e090d5db2f4f3232cb9925e2e45d553cbc4f910334b64b89e70954c52b15b9c94a4140b04666131c5ba6b2b186bf2f801d7eb0345dc8661548ae102cea656382bad7dc9bb9f9db6449d2994c47e26a260269b9c0d82dbbe966c499502de965912cd79eb23d9d2c85376624da584200c84b659e6cb5c7fe10f0fb381feeee7c6e0f6c57f3b89908d564259a357e7cc3811", @generic="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", @typed={0x14, 0x41, @ipv6=@rand_addr="9eac25ff8af2d3ee6e8d16ef8204b51b"}, @generic="17a87846bed0abbd07635fae905557455e547c81e5a08ea08a4b33e0dd92377cc354ec4114bfc423669e26633f9f7c327be05662e043967f32521a3a64134499f0938c54338e49eef2813e1375864313d57565a3b4a9dd715b3586c31b97b204a3c7df6e9f398d0c90b7dc61e16ed9925d4867d994f65ea2d92ebb1edb6b26"]}]}, 0x3740}, {&(0x7f0000000540)={0x1b8, 0x25, 0x100, 0x70bd25, 0x25dfdbfd, "", [@nested={0x120, 0x51, [@typed={0x8, 0x5d, @pid=r15}, @typed={0x8, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x27}}, @generic="1d4e67d28bc48620dbd8739ad31a6188ac32ba29d0b2b88ea3e3128371bfb7c5e8836d50168dd3b8836f2409f7da352682365e80807923bcc1e66a05838adb4977911c5e6fbc5d482d49a8ef3e8ef203c08239c0f3cfd33b31276c934da6170f8af2e15877d26068", @typed={0x8, 0x3c, @ipv4=@multicast1}, @generic="0405c069f044642893d40d42c609e683cc1796406e0087c37ce9e4a69ea2fa7015569a6a6dd5e5b62114233cd803325eafa1a907d95b83b05047cc5154c2e51e731fd6013a62e8f6b9d1c5a3e9ecc9bcbbf7bde6990d5bcf2ef5a6328576c10a33a015c0740951f96efc3d3da225168bc23f231279b4df729ddac8c29ed6b8052e5827925c5cc7f132814a391a6ccfd66f16618a321bc052a6912928"]}, @generic="09b2c805d3d1de0fd61aae6f39341c984706afb7656383cf424e4ea7ebd613620fcf11479c559148bbd1f29b3173c3257f5d15624f5084d1c562c1cc0b0b6fc3953387b850ca7946c8a93999095dcb36124fe1f2cba785de8510fd3dacbeca78c522aaa37526206d85d36a86fe64c5979af8806f9308e3f1c7e997536f125052325d4bad73"]}, 0x1b8}, {&(0x7f0000003fc0)={0x218, 0x33, 0x300, 0x70bd27, 0x25dfdbfd, "", [@nested={0x110, 0x68, [@typed={0x8, 0x8b, @u32=0x7fff}, @generic="ca986b3807d4050971f06511c08ebe19e241ad88028356e6faed6f71237eb5bf78e1fb3576292f58eccf8499485802a0f23bf7bbe0ba86b9eeb14abf461d5588cae18d03b541b0be64ffb4cc1259c1292ab078d3fc313b9337d1e39d4019618f34ba55a1de33abfd615c2eddeb0d065106599d50f4ebe27929c230dd59a7a2a9ac554a00055de4867c3e2c0d2aea5972414f5ab9a893283d141ae30bc1463c17f406c5087096aeba095044c8c2252f2c1b8f52f66326e4", @typed={0x4c, 0x72, @binary="18131c3d307972e87451c4e0ca012faec1eeba94dbbd35eb1b6837cc1bb9537cb87449162086493deec5898bef1fb17f4e6acb820cbf0aadb36f18d3dd3e8bcc1b75934cd4"}]}, @nested={0xec, 0x2e, [@typed={0x14, 0x1a, @str='vmnet0mime_type\x00'}, @generic="1c0193aefc82e71e2882a53d4f84b2093d1650eb9d1ae7be655acebd1b1d6eb0a7820f6330091e4586d94aea4f4e0c8e93f55aff98cf83335d508d94713a8c8da6cd21dbe23e781bf6f978b458e88a6ffe37f69f89e3be5635b2c5e25148aa6a5c437a16731372801b6bac8b3878a5d823cf56357ffcdf7cf418608c797238142fc95244f562d55ffbb57c6dd4197efc589eecb49839923beaa09a92b8", @generic="fb57fb3b05cc5b", @generic="756b8db54a384a361ecfeb39c4c5e149a70b5e5503fd9555014129e6ef65cc9a6615bea564ce4eeb03364aba97"]}, @typed={0x8, 0x56, @u32}, @typed={0x4, 0x28}]}, 0x218}, {&(0x7f0000000300)={0xf0, 0x11, 0x200, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x8, 0x3b, @uid=r16}, @generic="8a915c86e7d3b7b0bee11fef58c0fcf3a4b6e8beb1b1c4e0e55311ea57357afd18f09f90a2b759162c6fa1e3b1d45af3987f4ea229d6f94ef19380680a365bb41b8a976bfcde540d1f21ed3bf6dda58cf0e2b0f6a8268ff4c81492c80daa09f8cd096ca585968fb49c94b018d17adb2b358af9baea40ecd93b95867431e1ef37d9b1a2deae79b08da432d35014318865576009295e7b131f9bf13a349c6a1ee0a016487e40dbf52ad40afcc378afb41317ae296676d527ca985c3425f45693ef89af004cfbe9ee39e1d9159fc89f7dbf316cd7a467d5"]}, 0xf0}, {&(0x7f0000004200)={0x774, 0x33, 0x200, 0x70bd2c, 0x25dfdbff, "", [@generic="a7e954c5cf90b48ae3c74526d3a5b9994dcd249612b7a4f9710c0ab067b38f226a66b23857f47c25add53e5d1618773ba95c28d9c36926f5527b90c7ec2178c0e0dcbb69be2695ba117043831c6989e83c541daeae9ed7bbdddec47fbba18a41642d5809703b4784709ae7ef7b7f79dc84e0825c85cd559a50d719a8ecab1ea08d882c50ed99a341791221d413dd7941759f9f1ee6ce1f9c3d33b2ef24b5502e941c", @nested={0xe8, 0x78, [@generic="0609da702b80276bad6cb199e733e50caa539fd6aba742de1642750753ffcb4662f9b1c0c7642b14ec52fc51ebebc4b4cda73e8c1baf4d67cae900e9b3de015711692cb7b4d25dd58e3638f323d08baa37298c6347385ea84c90e8a6d323d06e1077a745a1f7946efcbe440a00be5c5f767cdf5ee9b14aebc9c01265fd19ade88e5cccb94dc4283ecaa6e337620abf30310ed53b7de2cea9dd638104eae25046107bf74923a08c139c57ede76567abb0e99be1798592bdad241b2b9168702105a27441f2220e77f9c9fc43781551cfad2d313ebd6a339347dd02cf9768c8b8", @typed={0x4, 0x44}]}, @nested={0x110, 0x21, [@typed={0x10, 0x13, @str='\'\'*,wlan1\x00'}, @generic="785775a967f19f8a9141e3547340585bb0901da03dddf98631a2e58bfc5deaa046cd42332b9c8da2624657cb314e829d7bfc72664013e72bb68c7c4c52a50d9171f9551994391809eb121fb73852352220fc44fbbd814c36e4e69e72ddfd2bba6352513494afbea85b5f6a1840c3c7eab3693dd19669f0525063c7f70bc4fd5b7a2874b181e45bf957c8bba7856789fac3354ba29e0f382f76b223e09ee8701cc7263ab42c8c3a506a82e9ae9e1ba475521d8d379b18d8d495c4dfa8a55b666c76eea919b67367e82468db9ae543f7fd6dd3544a2830b5dab14f43537224b7f5ca587f6e7894aed90025f0c7ad15e1bd", @typed={0xc, 0x7d, @str='msdos\x00'}]}, @nested={0x334, 0x4c, [@generic="ebfc65b1785294c6df4513a74cc20fdd4ba932cf6c81c42df1fff1092fc111f0d7ff7218842a1b43b9bfe20b75e61ac143f391db740560b9cd936850cb22cdf3ee3491fca8cc7a10bafd22933d4d7946c25d8be9cb5f7a314b64950498fb88c8af2f96a766d60912180c5fa43d1f59648b4f99ec86c88e2a91d4b452f1b097c101bb7d1a7bc968998c92b31c98810c8f9223e32c03e0e30fd68aabdb1ec66e7e49a71ef7c4d832566cdb0c313b7389ebb1cd49e1d25f", @typed={0x8, 0x5c, @ipv4=@local}, @typed={0x14, 0x4f, @ipv6=@ipv4={[], [], @multicast2}}, @generic="99f6faa4587db4ecd460efd83f2d7876c556a99966f3ff37534cb740e4d523459874e19f76596bc306d98a3e4acb36dd1b6027541be10cb6775ef65eaf8630e2e31c3a221bace6dba4e114aa10147b496cae20e989644ff8cb5ffd261bc131882d8b72037fb749a335bd3a3364333176e2d797ce8fb12bcc1bf72de195078e507c1bcc6034e9de6a891172ccfa2eed04d70440df5c0bb7d6e1dc82354175f40efa5115", @generic="c1a958e64f93cfdaadfcc6d2a7651dd44a2ca58d471a930597c2778e38c96d21d6fa0b86e7ccb1d199167aa5439b645615052fd2cfa798a013a4632f4590d5c103edbabe2d40c6ea313146103762229627d4bad7743619f4419c51c9f8588af16a291459880ba6f07f70fb61b2a229bf06aeb009ac91764f65a8ed78798a374e631cff7a866c6d711074af1b5d8f3e92fee0152366c2da63a30a73e040d0f97647792d6507101523ee18074cf8d5085ea3e34977365fd340ca56fbbbf1745cad1b45c2", @typed={0x8, 0x38, @pid=r4}, @generic="ac1c5c44cf6a634c5f8e7f01916242cabd794ce2cc45b2c9afbeaf9cb9bf8f0a0c38ad0ad3ad602138a8d5d3e6b2f65265cb0e6d6a9a4cbf077a693a", @typed={0x8, 0x41, @pid=r17}, @generic="3aaa597711474c7b5543e1b46835db82fe34186308631508e40486ac10b73a362cc2008bc195e25d8733720faf8b66004f211f236c548f562a2925ad885b81fcfaf4b75e6f55c84156deadd62ad3da1f5ca81b0e794c119b2c7c38596b4f11764261ebd79a90b80e50c9f8497859df2196ff3aae336106ca8b4b3d58f21bfe9ac468ca7d4b21c0a4595f870c33836f933057d3244d4b97f47ee8a1409f701fe22db0662cba977c74350c3ec8"]}, @nested={0xb0, 0x6d, [@typed={0x8, 0x13, @fd=r18}, @generic="ea6e7a29da286c8df3d4561712b1847aae589c54ef48926f0154f6224793ae1399430ea1c2c3cbfdc5dd2e38e15f2780f6149237cd17effe5fe643e10f16df6a9d8c032083fcb93c1b330428fa9356f17754a9a02d185375291a0f7e3b7618719cb221d8fc51daa3764356a77b09ffe39e4b644969be9e292ac925ffde3975ca1ef567d66fff65f3d978", @typed={0x8, 0x33, @uid=r5}, @typed={0x8, 0x7f, @u32=0x1f}, @typed={0x8, 0x91, @ipv4=@rand_addr=0x9fd}]}, @nested={0xe4, 0x26, [@generic="b63954209e2108f8b88446e6e7ad1cab49af1896ef4a46d142bdc28bcf7722efc2a3b32ea98ed6", @generic="82146eb88508e7dbec2d", @generic="b3319d7c6d44335ca07a9de1f533c74e16aedfcf21902c34b818932693f5b3d591bb9d1bd3010ceb115b2e1f48c83be83ac8a2122a2e65f1d5bb079032161d8ba38b59a15061a6dbef6cbed5b74cab1634db9c725bb615b3931c77d5fd8f0e53c0b99d1459622a240a206ac489b7a6128681e5e5f1a84941c251b96125e48bb3cc21f426638a9476f0643d76ec902db5b0e4d608a10f3e62301311c9aa5e0ba691a6cc9691d159b56941a633"]}]}, 0x774}, {&(0x7f0000000700)={0x10, 0x25, 0x1, 0x70bd29, 0x25dfdbfe}, 0x10}, {&(0x7f0000004980)={0x1634, 0x3a, 0x100, 0x70bd2b, 0x25dfdbfd, "", [@generic="f553b3490916ce8fb1dd3ed9cb99603e64834ba8ea72952e24eeee33b782a174c340922cbc06919ad4d70e2705601aefb6c42ca14160", @nested={0x140, 0x54, [@typed={0x8, 0x18, @uid=r20}, @typed={0x4, 0x69}, @generic="d9af3f69d9e4d8a8161c29c240e86a7b0fdc5e59bd79967b4f829f4c60c91f0a0a1218ffc342b42787f95c0394760003b266fe5b9c9faef6", @typed={0x4, 0x8f}, @generic="f4fa81ed32b63b6272a88e25b5dfdeacf251405515e47927520d5a3de8590314e8c12fc8f72e64564b28edfa0e7af1f4f412ee512bed8daef0a760376d658ba9a5fdea1edcc773365b3431c655bdd208803aa9ad88164d104ee479e1ee240114691be0df703e12a39bb3fbb3297d3e161aef49a6a5da3bb26e87249acfd82fab0f3315847576a99c9d34e30ba47765c4cf49287f412b0b3820b7af5b0fa25738bea3a459183017c54a51002eaa9cd559e051ad216ebafc9779b4ab17cc4513a38f1ecbc44a81a64d0712995b70d91a4a9087709e0fa063a319bc30af4b6ac1a21754f59699ee0b619e2068", @typed={0x8, 0x39, @uid=0xffffffffffffffff}]}, @nested={0x22c, 0x84, [@generic="c977aa2727ef9277ef573d5aeb1f71cd6f19581698f5eb6890bfabf7d3c8b95dd5cc708ab7f97c25cd4d91d2be12161fcffdcf04a965063fcc8f5e7ae8392a45c5433c321a5bd9535867b03dcb6ed11436a56aedc5e4063be955ea00071a1250e2fa18b8ec2ee2c9f84d95e321497d8f4717c07eb715133544", @generic="d67a9162dff0944b1f5cfac12a460d19ed24104011e729a786364fa5f6768c5b9ee1771c724e3902c86eb38f6038bb265a46458040e0a547fa2fa47a0965b7c8a2ebb744d788eaeb68e35076955af4e5990c76792af0ea3a23bd0cca746da3cd9a0ec0efcf8b794063ac501a0e81db67a60dd1fb9d256d7e3b1a9e402424d7b228bfb4531d", @typed={0x48, 0x6d, @binary="f7d1899f175379b713000cc73b8d0b80009bd38aecdd4b77b1d3128b66b8135ef8589de8c368e7e46f4dfaaea3adc6aa9466351319d236fc2ba04813fd49f912f4"}, @typed={0x8, 0x8d, @uid=r22}, @generic="3310bbc96dd98b186a65eb", @typed={0x14, 0x33, @ipv6=@rand_addr="f185dcc61bd3620dbefcbeaedf92fdb4"}, @generic="a668bc50e81f7e34f3251a046e337835e181376428a22a6e3ad414c3e5d143125575dabf3b17e7d2213294d8605855e187a4fdd028561db9f09a3971d0e5a92dfd4a9a71112544d1cde406e218f30567c5e1a8898f1ffe1a602d7fd0200891b91295f0afc3651e0a8b93efc5150ba94139cba5503b422165f744a990aa8518e47cff9c87fdc80e2b1a8b395daf381181b1ada67a48e84c62d9b9fcd3455936f98d81e73e1886f185d121508643bdcf5faee314c1ab6dfce37ed7c2"]}, @typed={0x90, 0x2a, @binary="4c96b25f5c4217b26d3c0a6c29b7787d4fce6b40f5c63ad31397cfcdc02a8f5e26e59ddb38e22acdf3285c7beda70e906b3812be7742b538605a21f4ec56c8ecb5bdf1f56c235587000f61587266f254bde25198c635d0928f54350a99e562ec160670ef6cf19801c01a368d60ca011bb9e2775731f7475ed88a21ddcddb6c65a7109036c0070cdf41"}, @typed={0xc, 0x6c, @u64=0x8001}, @nested={0x11e4, 0x1, [@typed={0x8, 0x7a, @uid=r5}, @generic="6941ff3ca592086f6b6fb464a9722f9a84d9afdf6588d02dce1243d2021b5b4045c3d96a59e2085ab003df7187f6c80339b0cb04fdf32eeeb8bf91926aeb4c2a4c90aed24b7b7790df69e0fa783ef8abf6a811b8a180c69c2906c72886d3a6a892f5cee033f6e7bb46c734988ed6b921d319270e5194d192adaa56395dbb6bf098062ebcbd1f60f5e237af94b2fc48e1cbb258b6980e89dff5cedc8e2d8127650f1c1315ea244806a4fc130e1cba88412d6933a51973a8e073497b845bfeec154113eab5088dd91fa083be237c2325f45e84eb8cd72a1386a28eeb3360c785aa51751fe79ccd609a9a5026", @typed={0xc, 0x42, @u64=0x401}, @typed={0x8, 0x4e, @uid=r23}, @generic="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", @generic="e8bdd65f13077d21ee6f1f2dbdc7702500670cfee12e8216a7c5c203ad8b257d98b349a2f2a24017b76fea7fd866894cd85c5daccae8073a8b9738df32bdf1ff02726e70ce63f608fb4495770d8b9e5c8354fd6d13d7d2ca5672b46dce69369cc92114394915e32179f50001f47031f1541ef50c28cd86", @generic="ac348704d8d9f04bc1e3642a4973af2bc58d356943354d8c720786091c7dfe920fbdb97634e26b5ada5d115e1e3f9c12baa91d9d5f3179c1c8f0f57ecb4e7628f33b4ed0286eba507764bd3daea78b2c173ad48f8e323edbb5f2", @generic, @typed={0x8, 0x91, @ipv4=@empty}]}]}, 0x1634}, {&(0x7f0000005fc0)={0x100, 0x10, 0x200, 0x70bd28, 0x25dfdbfb, "", [@typed={0x8, 0x5c, @ipv4=@dev={0xac, 0x14, 0x14, 0xa}}, @generic="7a18634dd6ff1d7d1c249a8dd7413291534f43246d3b563c645d7cbe12bcd68e38a06f749b8ce1c77c36209555d808cc53120c24e1f91907d37a6029472ddcfe48e2396efcfcc3b590c4e825870ff590d31d027e6ec848bb01507aa7c65c2f91f1a92e3e2ec7d804571f0f55f64e96e757890468527783577ee6baf9cf8b86924e7b2afb3b6d1736caa69e8e0f254896fce1950e3615a9b0507e051039f351e718454a214e7719dde894cfb26249533c9f0459d1e878f93079cd3d8af23149e0a3a87fdb0064353f0086588751874de10235ec3e82952ad5e12ec7fc3aa3", @typed={0x8, 0x50, @str='syz'}]}, 0x100}, {&(0x7f00000060c0)={0x108, 0x38, 0x4, 0x70bd25, 0x25dfdbfc, "", [@generic="956965ae49b9a1d539ec2a458e0b8022c36080a761657f498aa1d967a135df212c4a4529c24589190289e75678db236b", @generic="468517440f984987b57101c4aad97331c54eca6e680ff6366c21c31d9dc2c95409259d559620b0099346e16f4af36d4a0773e601dc2806a5b813b160b5cbd93dfe89217e90683625447785c9ed57895dc59382d7e3f33786d9c99a8bc813b165e1ef9e09b14f64786db173d265b74f261d14cadc19473e9180686dfbdea1f87fe834cd974b38e0d6c051e97c3ab1a2b43ba4f90c6935b445439a82cc728ede906e044b7411f3a5b5b6779530bb8bd85b59e3523434c2bc9544d9b620bb1d47ed678f3a5f73bbff"]}, 0x108}], 0x9, &(0x7f00000007c0)=[@rights={{0x20, 0x1, 0x1, [r2, r0, r3, r1]}}], 0x20, 0xc010}, 0x40000) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r6, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:19 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x349) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fallocate(r4, 0x4, 0x100000000, 0x100000000) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RSTATFS(r6, &(0x7f0000000140)={0x43, 0x9, 0x2, {0x7, 0x7, 0x951, 0x3, 0xcc8, 0x1, 0x0, 0x9, 0x401}}, 0x43) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x2400, 0x4a) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:19 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x304) setsockopt$inet_buf(r1, 0x0, 0x10, &(0x7f00000002c0)="ee3d016935e583882d39d38fb05934cb42b0c18ac578f9fe54efb25c28a5dc088ea77198b3822e2228bb7602753c98dbd46fcad75fc187068116bd67d86e7c60dcbd323d8459668efb984de6e64aef4117a1dbe888c88cc595e3ef9b96d1559d59789324a59477a75669f76e8a3873ef19081b5d0e7f47d61897e09241be47cf365ac935630a4c33061d7b7c58c8589f7781b73cf45313913d78a81642433ca8b13348b99b7329c33ab718e7173755c7cd49170091490a41a43a186593f34c27cf95d927bcb793042a7823baac6d82521b251a9ddbfb3ba111616d03fc4075b88723100a8db78fa691b9a22c7765087c3750", 0xf2) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RRENAME(r5, &(0x7f00000003c0)={0x7, 0x15, 0x1}, 0x7) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./bus\x00', r3}, 0x10) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:19 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r2) setregid(r1, r2) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r4, &(0x7f00000017c0), 0x1b4, 0x500000000000000) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r4, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="dc008000", @ANYRES16=r5, @ANYBLOB="000226bd7000fcdbdf2505000000100001006e657464657673696d000000100002006e657464657673696d3000000800030000000000100001006e657464657673696d000000100002006e657464657673696d3000000800030001000000100001006e657464657673696d000000100002006e657464657673696d3000000800030002000000100001006e657464657673696d000000100002006e657464657673696d3000000800030001000000100001006e657464657673696d000000100002006e657464657673696d3000000800030002000000"], 0xdc}, 0x1, 0x0, 0x0, 0x1002c000}, 0x0) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/status\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = gettid() ptrace$setopts(0x4206, r13, 0x0, 0x0) tkill(r13, 0x3b) ptrace$setregs(0xd, r13, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r13, 0x4d, 0x0) r14 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r17) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10090020}, 0xc, &(0x7f0000000600)={&(0x7f0000000780)=ANY=[@ANYPTR=&(0x7f0000000740)=ANY=[@ANYPTR64=&(0x7f0000000680)=ANY=[@ANYRESOCT=r9, @ANYRESHEX, @ANYPTR, @ANYRES32=r14, @ANYRESOCT, @ANYRESDEC=r16, @ANYRES64=r17, @ANYBLOB="c911692a4f85fdf121b3a66dae814e3fb373972d6b2bcbe0d842f16edff64a3969c977ffec522ed41e1564bcecd764904e91f6263418aca1049649c9955126edbc29c7399d24b4"]], @ANYRES16=r5, @ANYBLOB="000426bd7000fedbdf2525000000100001006e657464657673696d000000100002006e657464657673696d30000008008900", @ANYRES32=r3, @ANYBLOB="100001006e657464657673696d000000100002006e657464657673696d30008900000000", @ANYRES32=r6, @ANYBLOB="100001006e657464657673696d000000100002006e657464657673696d30000008008b0004000000100001006e657464657673696d000000100002006e657464657673696d30000008008900", @ANYRES32=r8, @ANYBLOB="100001006e657464657673696d000000100002006e657464657673696d30000008008a00", @ANYRES32=r10, @ANYBLOB="100001006e657464657673696d000000100002006e657464657673696d30000008008900", @ANYRES32=r12, @ANYBLOB="100001006e657464657673696d000000100002006e657464657673696d30000008008a00", @ANYRES32=r13], 0xe}, 0x1, 0x0, 0x0, 0x2}, 0x8040) preadv(r3, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) 19:18:19 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 363.750525] FAT-fs (loop9): unable to read boot sector 19:18:20 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x800, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) syz_open_procfs(r1, &(0x7f00000001c0)='comm\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f00000004c0)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) r3 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/relabel\x00', 0x2, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000240)) r4 = dup3(r2, 0xffffffffffffffff, 0x80000) sendmsg$TIPC_CMD_RESET_LINK_STATS(r4, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000010}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x300, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) [ 363.802924] FAT-fs (loop11): unable to read boot sector 19:18:20 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 363.869924] FAT-fs (loop3): unable to read boot sector 19:18:20 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:20 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x22c001, 0x28) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x10004) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000002c0)=0x1) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x84, 0x0, 0x20, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8, @local, 0x2}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_bond\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4}, 0x10081090) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 363.945261] FAT-fs (loop7): unable to read boot sector [ 363.958567] FAT-fs (loop9): unable to read boot sector [ 363.970602] FAT-fs (loop11): unable to read boot sector [ 363.988550] FAT-fs (loop7): unable to read boot sector 19:18:20 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:20 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$packet_buf(r2, 0x107, 0x2, &(0x7f00000001c0)=""/90, &(0x7f0000000240)=0x5a) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 364.034514] FAT-fs (loop1): unable to read boot sector 19:18:20 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) getpriority(0x1, r0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:20 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:20 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f00000003c0)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xfffffffffffffff7) sendto$unix(r1, &(0x7f0000000400)="70acf801dc2edc03758a765ffddad1a0f10aafc8c0fe871921c4aae3f03376139e407bd70e0ef4780f4b84f1046c9fe9fa6761240ebacd8598fe9fa0e4a2add8bf4eadcf0644527ccff5637c2e8f9ead", 0x50, 0x3e76f2eeb8fb00f5, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e20}, 0x6e) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r3 = syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000300)={&(0x7f0000000140)=ANY=[@ANYBLOB="2d369e527d8859b586e70fd35344dab2f0a2aeaaf1b5100a1abbd0c399ba2105fa79ee7c4a3af9972b4d85924e6455cc1b40c7aa", @ANYRES16=r3], 0x2}, 0x1, 0x0, 0x0, 0x24008899}, 0x600095a) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8040}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r3, 0x2bef23c66079412e, 0x70bd2c, 0x25dfdbfe}, 0x14}}, 0x4006082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_QUERY_BPF(r7, 0xc008240a, &(0x7f0000000000)={0x1, 0x0, [0x0]}) write$P9_RREADLINK(r5, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x20000, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2b}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:20 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 364.220885] FAT-fs (loop9): unable to read boot sector [ 364.222715] FAT-fs (loop7): unable to read boot sector [ 364.227280] FAT-fs (loop11): unable to read boot sector 19:18:20 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x24a) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:20 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x400000, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:20 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000140)={{0x89, @empty, 0x4e24, 0x3, 'fo\x00', 0x11, 0x5, 0x6}, {@dev={0xac, 0x14, 0x14, 0x19}, 0x4e20, 0x1, 0x8, 0x9, 0x1}}, 0x44) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RCLUNK(r7, &(0x7f0000000080)={0x7, 0x79, 0x1}, 0x7) r8 = dup(r5) write$P9_RREADLINK(r8, &(0x7f00000001c0)=ANY=[@ANYBLOB="0ebd000017010005002e2f627573"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:20 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) munlockall() setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x4e24, 0x3, @loopback, 0xfffffffc}}}, 0x88) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 364.339314] FAT-fs (loop5): unable to read boot sector 19:18:20 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:20 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 364.449509] FAT-fs (loop9): unable to read boot sector [ 364.453622] FAT-fs (loop1): unable to read boot sector [ 364.466335] FAT-fs (loop11): unable to read boot sector 19:18:20 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:20 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) futex(&(0x7f00000001c0), 0x8b, 0x0, &(0x7f0000000240)={r1, r2+30000000}, &(0x7f00000003c0)=0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RAUTH(r4, &(0x7f0000000400)={0x14, 0x67, 0x1, {0x91, 0x4, 0x5}}, 0x14) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UI_SET_SNDBIT(r6, 0x4004556a, 0x6) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 364.522249] FAT-fs (loop7): unable to read boot sector [ 364.536427] FAT-fs (loop3): unable to read boot sector 19:18:20 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x6100, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e00000017090000002e2f007573"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8000, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000200)=0x0) write$P9_RGETLOCK(r6, &(0x7f0000000240)={0x26, 0x37, 0x1, {0x2f836405b4901fe8, 0x79ac, 0x7, r7, 0x8, 'losystem'}}, 0x26) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$UI_SET_LEDBIT(r9, 0x40045569, 0xf) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = syz_open_pts(r11, 0x8000) ioctl$TIOCPKT(r12, 0x5420, &(0x7f0000000180)=0x9) 19:18:20 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) [ 364.626449] FAT-fs (loop5): unable to read boot sector 19:18:20 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) mount(&(0x7f00000002c0)=ANY=[@ANYRESDEC=r4, @ANYRES64=r3, @ANYRES64], &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='autofs\x00', 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r5, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:20 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000480), &(0x7f00000004c0)=0x14) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@rand_addr="59acf906e226955b5a56a868dc7893c4", 0xfffffffa, 0x0, 0xff, 0x2, 0x100, 0x7}, 0x20) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmmsg$inet(r4, &(0x7f0000000b00)=[{{&(0x7f0000000500)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000540)="696448f7c172be66834a5e217aa2c65500fd33788a4cbb531ef286e41076e26202b1a33cf644d292bcb3041b88751abfcf3184e16f199a9d9e730ea37cc86e09f9e8034782", 0x45}, {&(0x7f00000005c0)="6557919d3e70e6193250617aabd749caf643d340f5be872a68f4", 0x1a}, {&(0x7f0000000600)="fbbcfa8b821715c1528e2edadb183024a24f09ba126b601439d59c149efe922243e45173025dc59834df7d7fe7d705d41be428c44a2926d907e2ad5e6e57854621f356b0bb2774380403a0732d767f9f49abe0893d29cc177def1a7c6151b6adfaabf3071f3501595ca2ae33d817e74203722aa14cece3a642084a47d5df94c15c7720e082c9e944479940011c2b201f1fc604ef64888bb0b6a68083c6acc2ff55", 0xa1}], 0x3, &(0x7f0000000700)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x76, [@multicast2]}]}}}], 0x18}}, {{&(0x7f0000000740)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000780)}, {&(0x7f00000007c0)="77b2e5d3b80f9df0413ced8e722c29b1801b08eaf6d7d2b7ae4cb755f7d6f5aa029ca9f1ba47f6179af052635a85590aa80f7884c4ca", 0x36}], 0x2, &(0x7f0000000840)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x3f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0x30}}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000880)="797c6299c72083c69c07be4146707125e089700be8158e064f88f0957346bfa5ebe3b8e741d6205cefdc88aee104a93847180beb20e6145cc7c204167e318c330584dcaed215af87350d87edf766d279e5e8934ecb69eb20e92d4eaa182aa68c3f465062c222f00ebe53dcaeea249d74509f5bc589b053779bafdd8c2a45904338ca13fa9604d2c72b3d618b2bd56677ccee54e3c53a98b4103eb7c9cda2d81fc542eab5064eb51853bd4f6d7ba451b25b948c36a1bb79bc7fe53a02cf9c8b8d5aafbafe45ef8dd9660c45610fd0195ed4573f55c1bdd33d1b9fbacfcf0f04d58ce1b2689d43416a1286f48d60", 0xed}, {&(0x7f0000000980)="13d519ebdd550630f2278a1f6c6486fe2a46abc9f4e43eb4f4b913ee8a00fe2ee4be4ff5567a259f4e11227d1077f45295f9230daa5c24328317f7fa8f5b4a062706e6d34c9868bd9a60c2a1e1326523e31f61d6e263ba555186492f7e73499ad40141d739552cc448889cb6c8d37f029d87389c09ddd44b352303ebbfb72939af832aa2d5c57fb5a7f2335a2dd2fba3486b83848ad3da7951a3918aea989c168a59be69aa512c47ff304102ff584ce6171699346c026365cb8e2ed2462ff48fcdbfeddebc2583b772af60fea053bc38f55f06b6d8eea75d62c2ee854aa47b1f4eb626dbdfc7b876", 0xe8}], 0x2, &(0x7f0000000ac0)=[@ip_retopts={{0x3c, 0x0, 0x7, {[@rr={0x7, 0x2b, 0x0, [@rand_addr=0x6, @multicast2, @multicast2, @local, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x12}, @loopback, @multicast1, @loopback]}]}}}], 0x40}}], 0x3, 0x40010) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$cgroup_ro(r5, &(0x7f0000000200)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r6, 0x400c6615, &(0x7f0000000240)={0x0, @aes128}) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) lsetxattr$security_smack_transmute(&(0x7f00000003c0)='\x00', &(0x7f0000000400)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000440)='TRUE', 0x4, 0x2) [ 364.695345] FAT-fs (loop11): unable to read boot sector [ 364.708186] FAT-fs (loop1): unable to read boot sector [ 364.735147] FAT-fs (loop9): unable to read boot sector 19:18:20 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:20 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000040), &(0x7f0000000140)=0x4) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getdents64(r3, &(0x7f00000002c0)=""/230, 0xe6) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000001c0)=0x0) sendmsg$nl_netfilter(r4, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa0422001}, 0xc, &(0x7f0000000200)={&(0x7f0000000880)={0x1024, 0xc, 0x0, 0x20, 0x70bd26, 0x25dfdbfb, {0xc, 0x0, 0x1}, [@typed={0x8, 0x82, @ipv4=@multicast2}, @typed={0x8, 0x24, @pid=r5}, @generic="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"]}, 0x1024}, 0x1, 0x0, 0x0, 0x80}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:21 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) mount(&(0x7f0000002ec0)=ANY=[@ANYRESOCT=r0, @ANYRES16, @ANYRESDEC, @ANYBLOB="aa85ab27740f50e012bdd97680654df474b0e7173a434c3f1ea380e653762aef20", @ANYRESOCT=r1, @ANYRES64, @ANYRESOCT=r3], &(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) sendmmsg(r6, &(0x7f0000002c80)=[{{&(0x7f0000000140)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x2000000}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200)="51c098a4b806c2acfd844011667894a78bf47b392d325e64f1f4a8764e54e1ab0c713baf48f27be4d23289e477f56d577a2b71644d3a276347189cee64b3179b25985beae233716248627186ea4efb83ccf7e7cf99d5772d31414b", 0x5b}, {&(0x7f00000002c0)="fc063076d9d9abbc4c1d323ca4842e2ea2af382cec237f29c9cee240516324663573740dd933239250e4be3f8b1d645cfcfec2eacb8ab6f8468cc28e7ad6a0af15f942b4", 0x44}], 0x2, &(0x7f00000003c0)=[{0x60, 0x117, 0x80000001, "9057332910db1883963ab910d9731085dc3c62a86e7ad8fb3c0c02cc6de5d19534149f30a3e40548a3946d1ff79c2c6681470652a63db2fdb1a8206d0a03b8ef35a9f7e4e6d82add59863cff5ac688"}], 0x60}}, {{&(0x7f0000000440)=@vsock={0x28, 0x0, 0xffffffff}, 0x80, &(0x7f0000001880)=[{&(0x7f00000004c0)="acd07e9477d7fe91239b6461136decabadb8c296bad2970c4adbcd35f78e23d02b0cad40c63e25fdbeb568d2126e10731331e3c379631562a56795b84cd650e2677e236d14d68a28c0687b57968f1050a0c76b8e590ec5548b27aa2c8974d23b638fa2f132f8f0a40ac9db03b2148dc1f46d342430a7bcef802d4c4385a56d2359e70e", 0x83}, {&(0x7f0000000580)="cce5f8f144ba6b4cc84059d5cf6fbdf2759bde68c40f42f01a802a791c324b3cccbda1b37656843aff3a106ebe3b1b6d025784aa5df124596cdcac7b5ba1da2477523add8c45c13b502ba38542a2fec614e7a68c975c7679efd13fc8216a84cd93b43275300bfa1ce47e037e0b836343bef2526a3e4a359a7afdefcb71841181891984386d72415667dc40eabca2671d310c7fba870f", 0x96}, {&(0x7f0000000640)="75d45cce8106d691b6a177f4112bbda67a9319d9e6bf7bddbbc9e9967f27ab4384d67128aff65e67f45630b4cb8d65b10e6cc3d0e306b88e90ea6d66ff98a7f589e447535f09933cf7b3ef189ed5ffc3271c0f9b142ce141e320ee9c0e8c978c822f4be8609594f5f716e47564df740a213af50ca6051679ff565b39a72bf236163bdca2c6578c8b4b120c9a055b675b5e7d31aa930b25e8890abee5b3fa08692edcc0a6eb283eec2c20538c9e43887dd21220f0697b0d4709a21e9cccd0dfa0ac28a2472d6e887d0d2e334f25d74c1a9ee6380ad62ed91bd1587469bf4dad2dda1899ce9cda976ccfcd6bedd585", 0xee}, {&(0x7f0000000740)="70ff514dc0742af8945c34a97f4423d4c11280f0b7074ed4f084022aa4a190e61201c34fc80c2938f45474a6ba4c2ab07d4c090f90b75fc494f4c6f00664aa9d4b5f295b63819e88d551320fb4ede95edfea5748", 0x54}, {&(0x7f0000000880)="b12c4ecf796d8553a342a7de0d31a1a086d280240f2df9d0ee34c94f615251de009989c1af7d9d0b9fb4120f61c3aaf79a5eac9cc13b3056719f5d63217d8f3e3967d2b2d0363c42d6dea66afcd41ce11672bc39237a2ea2bfed2022dc8cfccaf253e5c198c887ca5d9c10e4d792e42e6d596d961144b1abd7ba21c91c0047f340fbe6d807189820f982f711041fe3245c75f2439216f1cd4518036a5612fb96bd84cfcbedfa4ce73e48d7d5e909ddeef17a2b5c122ef1cc56d0cca12b7237c665d520a1f6e5cf70c65a04b57eb7cceff56188e178a49372d0ae346c471d5cc05cae245f6fc29eca2e2f88cf6c524faab22ed33efc8a81619a69bce33adced9b23c142c374661bca29489b8dbf66ec10c96cb35e03ea5bfa27ff1028e4e4c35841fec79250cdd47364070db00fdd2f0da8e93008e85ac022e111dcc205c02b9f4eca13772a27ec3ec234704169d90b2029a7ced14b782bc5271e3106748f101395058a5b0e233d55bece89344ebecddfeae1f0f44e30540af9a984707a6c88dc4551ced276864ed2e5cdc6c7cf337947499b348d04fa4faf5bd524bd6891ab2f36680ff89ff9724f4a76c397767bfa85a07b6a82c5f6637ac3ffefc2fd28f6090f4506caa09bacc4de76c0361d39ba41688371ec72d5857b9868a132230734d91d29b1aeb8c5bf325908b90a9a20392d19d017e4ac1df079e3c7fe24a904bf1f781d1ba8c3eb35d5d29abb0aa3ae07e62f7ff5eb42b989f08b3cc98c44c6b4c1014e6ede02a47b410d29c260f1f00efb4c95736d4d9cf885f0b0111c41c73df3a29cb0200f4d055e6d403a3726875fb4749ffd232c18104a1dad8cb9fc6d23bd4c7776473ed0cbce07cefd3f37153097e6162a9a8907f32c89881eeb87a09ccd7873a29f71ec3bf4be0cb8e5342563223af1ed900da6dcc0724330e7445e71b3ae1b4e05c3403d268d023f21928473c1a1f3a13373cd9c323d6b989f237345edd9863d034a4dc1c116d4e4c755e25663637cdc180e5146847eff40dc36652cfa3c4f5c79050af57ffe8f7aa652072b914e106c43c4a992044a5d730f1d96b7f6b2e89c05def9042ec1ba9de82e87f3b099a47a2ed7b5b78ca59f3ce77cdb756cbb5021ecd112294f4a90f1474310b5aa22892fe78395174bf041950a7e4eb16aa971f5e22fec6726b5787f7e6e9071ef2275dbacab90af9fc72a23741413238275b663718947e23a93b93a4c1fe87eed2900d579329acbf3ce17f7e123fb6e7295ada87b675e7b583497392ec9b7ad45b7a97c8bf9320e1d059acebea65fc4b2ed4e6917b7f9e59ff5e28599c1507f9b5a7ced997def056445be09b3b1a39808c72c4fb057b1225b01c79fe75df15230cfc97b8c339f58ba6a9b445e33ddbe9bb4324e529e5d232c5145c70f0fafac769671dd607454b95154234de338fd3662f95e080b3d37f9dd7a0df5ea8b181b58721c6b62fb4173c82db17c9a10249102f69f6e1ac9847a960365d55920371dddf02d3d93c2578ec1b7ecc2144f78e9d3d3d337e8ad42c77054aa4b302bb77bca3bc156a2001f654aedb39d29822db0e90d3e1e9e98e16682398234c7231bfa53016ba2a52b12386d765c457f12d4a9803c98ded71eaddcd81c9078e8d131f6bb08081af6185fe36b0845b37af506ab4fe167ca8cd9fe907c5d3fd1f44505133951ea71952fc843024c829b8107e50dcc12d1c42c6a48be0c3242fe41c9e13b7e1ef2c6d8b84bddace31fb22687fabfcba47168ed786f9316c62381798397fff98da2c25cf87b1d956f822d0c6e81635b91e476a1a0b17a47549444e068abbfd7559a927bd8d969364813ad195dd105f5deaf20b6afbc028a9c1178d17d6687f47fd2b87d6c0f08f99543420cbf4d32592d4ca7429eb7d68c513292141b7a0938e33f17fc913f4712cec8b969c6e2ae2eb3d7c6349c054e27058a9bcbb175de498d886cf5544f6d0b217669b1a29888b5a3235773b8546283fe67a4898fc87ecc096c80626d35f9cd19b29bf637829ca02cfeeb4ae27f8598e488c3210b67f6cdc5bc14751d889e58a681b4e508698789f0b45cfadd1103d7bc87cebb6a86d236cce84bf6c6353b8c242a23213c3853d02cc76d2e3733a311431d4e7bde353f767421fd611f868c99b195e127d94849ed47f6ba7a55dd1b1278f41bee5ced1cbdd77e7ef390a615bf065d48f58300b48603a44be92cfb346afde8fa0b0ab002d4be5a3b535507776d25e170acae3b023c26ce2556da903c5a3e5d5352bc6bc3c8cb0aac1b9658092baf9f15ca1252dc0396ec4b54338a1dc220c3b24581e23a204b1f39c27610cd7cd98125abf04278d5e9fca3357acfe57071f7cf8ae9bf7678e3e0b619cb4616196fc07cf302799c51a041542da535a64d7765e2c6aeb34dd76183a1eb6a47ca734c82b2454fbb51040be35bac56830bd8dbda48d80103bc89f4925a870d157f79330207e18f14060fceabc069a4a20d581d9d13f55332f35bd947bd858d1a9fac57f7984482898521de3eaed660b002ead9838a272ced819ad7b98cea4399e06894147622d369b92f8f9caae93c4eb34801049e12d6be7fd278ca7d03340aa8188ab00f8106c97ca6462647b3c2e91e3e90a65af443ae358fdee82a1ed2f826abdc6c69c2d31fc655ad41ab4dcd119f5ec0f37f7d76d129329e2867232d9dc166d5cddc101686d719cf6bd5e97f799a6a8d5253a2127837f8a7a17a0f4583c87bb4b4038ed81b19a4c48b2355d1a1d3684b01d5986e0bb17f91b73ee66dec47741631cea9a95ce100ae27b73df0b86fcffee74e63ba2e05df8c77d9affcc48f2c4e458ceb7189b85fac4c0612dc6f997ee1d88b96aa0ee0107b4e0d2e9e9d70260bb8934a78efd22059c591a00513b383341a18a3ab79564addf2b4cb5ffe08a96b8e699390b376714f34b469fc46709df062cfe0a9a6a08618da93711e78dbd7722526da4a298fab9ae6f8b437d81ceb35d82cedb64540f1c84488663a4f83d0d472ce343c8c9b7c85996380fced0a9ea0f85ac5aff0dc9ed42c353cf3e2d1a5bb08e8037d2a582dd7e912941f6207bf4ecfd9e7c0185b96730bbe2bf1f7e6c04bfefe02de14b45dc6ccf8559f81dd07d80806bffa9be3e5ae71a6baaddbcc820761cce7ea4b0f486bdc0c71718aae6838c8764f8ce37c2c1fe8e92d4dbe34485123933ea63303eedb2fad537ee23501241ecf75abe7019c406366d159f289083f5ecc8d10465f8151cf7bb36344ebe78cee7e41fdc5c734a3fab0fce8d086ff05e760685ffd7d612e389f0b4f6ad6e384b4676a964c3d6b04a9bbc17f7bc0a49ff7435ef5afb56e31d84338142cd0f875861b790d3e8569f2576b86cfd68473e2cd1cae763b661e30761be8163d395d535e99fa21be2773361283a619dc559fb2171b2e2e69206c3a7e15728ba62bd3a95a1bbfc2fdfdd0f755ed479fc77a91705e50dfb13dbfa2bcbbbf81150f357767a6f241b113a39346f1eaca4dc62dba7341cadadfc0f190275abe74cb4c398c7687de42b8147dad71d300390f32f1833615d98dd664fd4c97f5d169a6e828c29aa5c5a6b6dd2bab90563ff3d6475ee9b527ada790c48bc62763b838732c5bd50a14f73a99c2c5f13890b5e99fabb901185a97279ddfc6765b5a38a1b5579f85e7534a1b9665dc0ad907e89ccfdf972528109fd8f44face9b80bbc973118faa17c2b8eee6cd6c031bd3f06e2d58453dbb008d09369e05edf2e84f871998259b98dfb71c828cd864411e5417ae71fe6a4ebbdf22aae973076a7ea7b7fec8a7a450182f8c4d5cff03846cef034ea667e9df8cf3566e952a897b7f00a241fbbb3b0699c4b0725f12e87e64521fad198e00ae935da2ece4c90292ca972e6b75864ceb2ce077acabc5ec5bd5c97b2569df1f4955f8a5c6d104255968368209c16f23f520ffc9aa631fa71585620c2608da974c098a8a4bb6b3af27788abde75b44f36f2bce7a74374a93a37ce1d661340af6236d7fce286a80a31ce440226734d13f1ca8fa9240b1a0be65e45888560ea9ff1a87b92f14e9a54b839875b677e04e0bb43f8864ac0f6ebec4d1edd168aba21390048b99e34cc57120039f36a26c16bdfc92f4ace59311401d9df80e04120825fa0ed64d1c5a52fb47db1f091e5be036a5952278877eb03352063acfbfbac2e1a3c45e1ed748b3d22118a060460bb5ff324134942a46ebb9bef2276d9faa42e967d864bc2428c105ffe012e38370af533698330fcedf5c0c63baf4f8cc30df717e5cdfd36e4eb289943d2cf235881709b4fb11e4c596ae13aaa83ca07e716a7629ea3efadd765d3b72c17d836d29604111bb3da59b75eff81e46252f8a5a26ec278bd96c7673405d095f542e9b24dcc25e9141ab5f604557b04ce7e115964d14906a31c7f890966a3dc2fae2f6e89ac3a976e2148ce7945e40e787a32afdcee96e3f0a0170f4cbc135006575142e5902c4ef7835360f9be90a2b6229215e0c284396157e8ad20a7705c11813637e1a569b3eb08fb36a2af09bc654dc0707ce32c7bf82b1cd824d5bb40ddfadd14f54eab45ca334dc334bcfb62176cdc88b3970ffcf4a7b323034dea20e7940f5c535dbb91ef4e7390c9d12244407c15581dafe1f05baede931d6c67b0b72f3c163e53f999dd91d205d4236e683306b989d71f696b8417079f0202982ab4a7e9c29ac611ffe9aa149f06edb9fc4e11a9cfb2a0ee47f6e2a8a647882b2a56490a50097120917f376083c6f9c22d2ca89986a4426284747087c53959ecfe6def1b274ca42358033dc2b1847bbefafdf20ebc17fd6dd33f12dcb4096bbd6cba57efe7fe13e052cb97e38bb986f3e26d6c6b91f148c6034ad909fb6b2b8cd5a4dd96e028d18d14e3866302b80605b5e597e120d7d34ee545dc56958a5be99018cdccc5503827240143eb12c41122da1ef38598352e4ef4ff69681a1b46bd355581929ef492613f46c301e4370427c9a1c7d530deb2fea9f6c01419bf7e4ed334d162d45b88083418e426ca97528cca5cb32ae845588f3e7acb055e43f634f86f386774e8cb437db5c7bb765a9df1bba08da18df03144984aaceda1af65ebbb2a8749b4c4e6097277f2cf9d660dc4db7ae20d18482156ee8eb51c4cab603d95fc50001bf6409113a3c1caf2a7730370c974d631cfaf43c748b01428853ca8d6d233c5a4c1281921ad99c93bb38a4f20bfb3fc9255c18c9de892ff18908a1ce924571fb85e1732db1dffd00d51e7305b54b536fbb171d8303063106c695ce3356414056acc116abc068eabd0db6f6a620a4b7ca9b4e71c17c4185237ced76129316f366b28617c467752ca62d8abe87358e797726079ccc3962f70218ba761394ad7feb6d64865e9b2f1f7b7c9c83ab421f541dfb88703015f35bc4a9f52936ac539c71f37f19d5a72c88f3a1a3e584c644bc01a0cf8c7382469eabfc444bed950b0eaf5ebacc233e6be3cb672d1a92c3740df6763a6d764205686ed09cebe7c0ab7f94b6b41bb347f61bbf06f1ac8719bb6d9d83b60ab152bab60ccf4409db818b23771f8e1ae2c715c4f1b163f38f6e87c027745b06f1003553f11c4deb5a66aca04060376520cd54915c61152b84991beddc3fac09ca64ca4c509673ee69d4a6fdd82a0d5cadb6df31594e72756e02772d11d683ae4aacfe342b53c98dc24b9fa327bbd9439e7afa8a30cbec2b9cf959d0028b3ef64c71f814e358d64818d50eec7bf44ed8daf49f9312928915c47d02cf7d589242dabc609878212b358", 0x1000}], 0x5, &(0x7f0000001900)=[{0xd8, 0x47a63fac3bfed3da, 0x2, "2db15e4bd2fc4e85e59dc4dae3aa80d873adcef7e9b5ad6d380efc254d21c4ec0e5fa025e1c8a8e956b9f4fbd8fc34c0a5defd9a153bef6cdaf04946201d3f96981a2f34a03ea3fb8036ff85bffee7a41238a9032bc2a37edd60dce721ba6ae6fc3e46ba4028a23d79f9d95efeff8001fa637e3130c75e4e22e702d2f3a51f88ba308877e24c275a64e1c2f195c1264ee7b59992d9d4048cd43f6816976c7d6baeaf1220a0ac31e39c128c821c9ad08ffe2913ec179245825b9143991ff5408cb99c"}, {0xa8, 0x10a, 0x25, "dbacde26b4555e40e6cb82c6f08f9f1cbdbfd54287ea79301d1ebd135a669b860bc6c15bd697c4e7f4e1343971d962f17c15639efe976e7933f7701d97821658bdeb5f2194b6fb5ecbcb5def8e3dbb56694bcb95656a4a2e7930ce3d6c46d9c9252558369fdbb7110ed208aaecb2a2c56f74c6d33f79cdc3f36d39250591c070d3015e54f754d7304155f2fe8ebfda3c40f177836a1d"}], 0x180}}, {{&(0x7f0000001a80)=@rc={0x1f, {0x2, 0x0, 0x0, 0x3, 0x4, 0x1f}, 0xfc}, 0x80, &(0x7f0000000340)=[{&(0x7f0000001b00)="c34d8de38fe4427de205dbefc0836b736a1434afa1ffeac8e38cad1b23c7614992998de0100e6fdc9d32d90986e6a515645c42b5925fe782aae3d4f5322366dcbc90fe8f55086b8f76d1864f243e9c0478501fdc8d17278bf9f6de035b0a441f0a8a4ffbf88cb128ee4ec2dcebed342cf3fffecb9eb0187c2615fbcda0ce5dd079", 0x81}, {&(0x7f0000001bc0)="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", 0x1000}], 0x2, &(0x7f0000002bc0)=[{0x58, 0x3a, 0x0, "b9e362e174e96adf8f695d827803b407d86b736dc7377fe13d05fbcf6e9b69276e7e8dab74c0bb6b706ea7c63b015da0c9b77002fec6fc03aa9ecc9bc669fd58d50a6417"}, {0x58, 0x111, 0x1, "b64822c77452acb4146e1d3021810b536663325b8d29d32c7cf68620cca1b3be6728727527ff24b16d8d82dba6fb14b12fff093fe5bbf49fbb59002f99b2f67d272a"}], 0xb0}}], 0x3, 0x4002000) write$P9_RREADLINK(r6, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$EVIOCSREP(r8, 0x40084503, &(0x7f00000007c0)=[0x3db, 0x7fff]) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) [ 364.755824] print_req_error: 72 callbacks suppressed [ 364.755830] print_req_error: I/O error, dev loop1, sector 0 [ 364.769953] FAT-fs (loop1): unable to read boot sector [ 364.778005] print_req_error: I/O error, dev loop3, sector 0 [ 364.787237] FAT-fs (loop3): unable to read boot sector [ 364.872606] print_req_error: I/O error, dev loop5, sector 0 [ 364.878566] FAT-fs (loop5): unable to read boot sector [ 364.917216] print_req_error: I/O error, dev loop11, sector 0 [ 364.923480] FAT-fs (loop11): unable to read boot sector 19:18:21 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:21 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x7d442f219a0bed6) write$P9_RXATTRCREATE(r0, &(0x7f0000000140)={0x7, 0x21, 0x1}, 0x7) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x20000000000005}, 0x0, 0x2000000000000, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$UI_DEV_CREATE(r2, 0x5501) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:21 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) ioprio_get$pid(0x3, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 364.969267] print_req_error: I/O error, dev loop1, sector 0 [ 364.976602] FAT-fs (loop1): unable to read boot sector 19:18:21 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xffffff26) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup(r0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) open$dir(&(0x7f0000000080)='./bus\x00', 0x90001, 0x34) 19:18:21 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x1c1340, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:21 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:21 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(0x0, 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 365.151579] print_req_error: I/O error, dev loop11, sector 0 [ 365.157614] FAT-fs (loop11): unable to read boot sector 19:18:21 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x810a8, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$input_event(r3, &(0x7f00000001c0)={{0x0, 0x2710}, 0x289fed2f916d05e2, 0x0, 0x9}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:21 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000080), 0x10a1155191191d8e}, 0x0, 0xfffffffffffffffc, 0x0, 0x2}, 0x0, 0x10, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0xd, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = signalfd4(r1, &(0x7f00000001c0)={0x701}, 0x8, 0x80000) r3 = dup(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getpeername$inet(r5, &(0x7f0000000140)={0x2, 0x0, @multicast2}, &(0x7f0000000180)=0x10) write$P9_RREADLINK(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e000000170000000000000000731873515a63000455bca48487dfb7fb2e95249771811f71df9abb0683534c4ec2941e5edf55b8cff77b887e1ead70baf64108b19d3cf3397df1a5b79143807df1f1c274749e77e5ddad43af80e5e122651ba24d34d0f70d98cd583f044932b8a629fea34ed65dd0cf2917e2d0ad2cead77b3d30990513b286bfac8c41ec7ce292e5fb0000000000"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) ioctl$FICLONE(r6, 0x40049409, r7) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 365.224655] print_req_error: I/O error, dev loop7, sector 0 [ 365.232292] FAT-fs (loop7): unable to read boot sector [ 365.239564] print_req_error: I/O error, dev loop5, sector 0 [ 365.246160] FAT-fs (loop5): unable to read boot sector 19:18:21 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x7f, @remote, 0x200000}, 0xfffffffffffffd95) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r4 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) open$dir(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x10) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:21 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)=0x9) 19:18:21 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 365.287225] print_req_error: I/O error, dev loop1, sector 0 [ 365.294131] FAT-fs (loop1): unable to read boot sector [ 365.303325] print_req_error: I/O error, dev loop7, sector 0 [ 365.309295] FAT-fs (loop7): unable to read boot sector 19:18:21 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) mount(&(0x7f0000000480)=ANY=[@ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES16=r0], @ANYRESHEX, @ANYRESDEC, @ANYRES64=r3, @ANYBLOB="d6611313e9fa0cd1aed445ccb2ce50eb3c44bedd10302cbdf998eacbc7ac2c28dc5ffc490398352507e78739433c19676bf37a98c94620d1da280de55ff73ae91b0fdd07dc832a95b0b06ab7fda246153ffceb889b7a9211fc7567d5c160b21ff0f08031fb2b45cecbcc0afed0d5db62636f7dc7cc84457aca5069ccc4f5a0fcd262deab48357d03b1777bc0e59bb7e34c19a848e6b988bfcef7fc445a27c3a1a67c882ecdf10f58f22c7a0e54919cd4cf56cb7d1a9fe0ad4578ff798bc251e9c3b935a12df659da911ad9f57d7e269df4323a99698160d31fa3b2075bfd77c21fe79df6a9a387d59be8083d72ce611b92654e487a", @ANYRESDEC=r4, @ANYRESDEC], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r5, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r5, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./bus\x00', 0x0, 0x10}, 0x10) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 365.416213] FAT-fs (loop3): unable to read boot sector 19:18:21 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x280000, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000140)=0x9, 0x4) 19:18:21 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x1) r4 = dup(r1) write$P9_RREADLINK(r4, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000080)=0x80) 19:18:21 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x3, 0x472, [0x0, 0x200002c0, 0x200004e6, 0x20000702], 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x5, 0x40, 0xf2a73e6d0f081126, 'ip6_vti0\x00', 'rose0\x00', 'bond_slave_0\x00', 'nr0\x00', @local, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="0fdcedade79e", [0x195f958e7beb188, 0x0, 0xff, 0xff, 0xff], 0x106, 0x17e, 0x1f6, [@physdev={'physdev\x00', 0x70, {{'team_slave_1\x00', {0xec72d18924531c65}, 'batadv0\x00', {}, 0x10, 0x3}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x7, 0x1, 0x1, 0x1, 0x0, "cf1762ddb667f2733f31623b26a89493073f86f7d5d38c4a205ce2667181136314868148f0de2a4bd868c9447d1bdc1e0e3df85f049ff55a3ef78bf572387874"}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xa9, 0x4, 0xc7, 0x0, 0x0, "bcca12bc11a766daedaf666a62ea1f3da7ca4fd30bba54789da32b1961941f9a8267c894fa154fdc9517c22c94ce8d3de6943ce0643505d1d2c71a68358d2883"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x2, [{0x9, 0x8, 0x5d70, 'yam0\x00', 'ip6gre0\x00', 'bond_slave_0\x00', 'veth1_to_hsr\x00', @broadcast, [0x101], @remote, [0x0, 0x0, 0x0, 0x0, 0xff, 0x1fe], 0x6e, 0xe6, 0x11e, [], [@common=@nflog={'nflog\x00', 0x50, {{0x4, 0x8, 0x8, 0x0, 0x0, "d1eae4a458d7673798ca522241b7b22a7219a52bc8edae8412242694613019b33adc2dfc75d4df128bf46b44fc39c004e6189ebea0bdf94c0ffa2dbf6554a740"}}}], @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffc}}}}, {0x9, 0x3, 0x201, 'lo\x00', 'sit0\x00', 'bcsf0\x00', 'syzkaller0\x00', @random="ce6a8541c40a", [0x1fe, 0x0, 0xff], @empty, [0x7f, 0xff, 0x0, 0xff, 0xff, 0xff], 0x9e, 0x9e, 0xce, [@state={'state\x00', 0x8, {{0x5}}}], [], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0x4ea) ptrace$setregs(0xf, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 365.493081] FAT-fs (loop7): unable to read boot sector [ 365.552006] FAT-fs (loop5): unable to read boot sector 19:18:21 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 365.611653] FAT-fs (loop3): unable to read boot sector 19:18:21 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x800002, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:21 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 365.690239] FAT-fs (loop7): unable to read boot sector 19:18:21 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0xa4, r3, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x19}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3a09}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000004}, 0x58) [ 365.713492] FAT-fs (loop1): unable to read boot sector 19:18:21 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x800, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:21 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x200) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:22 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9419809d5ea9979e) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 365.837007] FAT-fs (loop3): unable to read boot sector [ 365.853222] FAT-fs (loop3): unable to read boot sector [ 365.864441] FAT-fs (loop11): unable to read boot sector [ 365.923128] FAT-fs (loop5): unable to read boot sector 19:18:22 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000040)={0x1f, 0x2, 0x4, 0x6}) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 366.017910] FAT-fs (loop1): unable to read boot sector 19:18:22 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:22 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:22 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) fgetxattr(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="750b0000000000007465aa65d166c1321be050a2fdf4e930bea48d04fb2a4bb0de1b692569e13a02b07f8293f8911c10efda86a3f4fcfea5449679453b0952719f8886548517e8304d4565290184fae88a408272e2751988def91f0e6dd6b7ec71cf0d865eba46e691d51d00"/122], &(0x7f00000000c0)=""/37, 0x25) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='map_files\x00') ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000003c0)={'veth1_to_bond\x00', 0x8000}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 366.064869] FAT-fs (loop7): unable to read boot sector [ 366.081251] FAT-fs (loop11): unable to read boot sector [ 366.102629] FAT-fs (loop7): unable to read boot sector 19:18:22 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f00000003c0)="8c", 0x1, r1) add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="455c3c04f6d39f05d8530eabeebc967fdf604f25b73b258cb17392638e7a35a5b83f45f0f936bacf34f7701171570d9857cc6707972b630c010dfe955baacae7fbd0a55d520d546bf82a2d66d0051cc6e4158d734cf3cb5542e5a0938e53263fb46c3153", 0x64, r1) request_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, 0xfffffffffffffffe, r1) r2 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) signalfd(r3, &(0x7f0000000300)={0x2}, 0x8) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000240)='id_resolver\x00', &(0x7f00000002c0)='\'^$vmnet1\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x0, 0x0, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="400000002900e50d000000001900000001000000", @ANYRES32=r7, @ANYBLOB="00000200ffffffff"], 0x3}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1280}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=@newtclass={0x58, 0x28, 0x400, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, r7, {0x4, 0xf}, {0xb, 0xf2450dffd4ff67cb}, {0xfff2, 0xffe0}}, [@TCA_RATE={0x8, 0x5, {0x0, 0x80}}, @tclass_kind_options=@c_fq_codel={0x10, 0x1, 'fq_codel\x00'}, @TCA_RATE={0x8, 0x5, {0x9}}, @TCA_RATE={0x8, 0x5, {0xe8, 0x8}}, @TCA_RATE={0x8, 0x5, {0x8, 0x2}}]}, 0x58}, 0x1, 0x0, 0x0, 0x80002}, 0x80) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:22 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) r3 = socket(0x0, 0x0, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000500)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="12002dbd7000fedbdf25020000001c00070008000100", @ANYRES32, @ANYBLOB="0b000300", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="0c000200400000000000000008000100000000000c0003000080000000000000"], 0x9}, 0x1, 0x0, 0x0, 0x4000000}, 0x24000141) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/null\x00', 0x305081, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = open(&(0x7f0000001a80)='./bus\x00', 0x40040, 0x40) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = dup(r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) r20 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r22 = dup(r21) ioctl$PERF_EVENT_IOC_ENABLE(r22, 0x8912, 0x400200) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r25 = dup(r24) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r27 = dup(r26) ioctl$PERF_EVENT_IOC_ENABLE(r27, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r29 = dup(r28) ioctl$PERF_EVENT_IOC_ENABLE(r29, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r31 = dup(r30) ioctl$PERF_EVENT_IOC_ENABLE(r31, 0x8912, 0x400200) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000001c40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8890}, 0xc, &(0x7f0000001c00)={&(0x7f0000000540)=ANY=[@ANYBLOB="e8000000", @ANYRES16=r5, @ANYBLOB="000429bd7000fcdbdf25030000004400070008000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="08000100", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="4c00070008000100", @ANYRES32=r17, @ANYBLOB="08000100", @ANYRES32=r19, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r20, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r22, @ANYBLOB="08000100", @ANYRES32=r23, @ANYBLOB="2400070008000100", @ANYRES32=r25, @ANYBLOB="08000100", @ANYRES32=r27, @ANYBLOB="08000100", @ANYRES32=r29, @ANYBLOB="080000002558ec07d4df0e665ad304e01586f0236c84aac7f915dc4fea470413da2dbf1b10b471691966bbc1bede3b7858de13592741b0cec36299cafc6cab219cbdaee5c5324c6c2fcdb2ae59619fa28bc6a30532b8065c5605acc4f765bf039ee5f5e5eecac330d920ee0c9f3621add684f3321ea956ef3f744fd6501b222042d10a6b583707a0e181c989b02a41f951b3582c7ec07426c1f323828ada963866c2c9379ae1d8b7660c326af068079ba5e116ac65311a09", @ANYRES32=r31, @ANYBLOB="08000100000000000c00020009000000000000000c000600a636c24b1e6ba99c"], 0xe8}, 0x1, 0x0, 0x0, 0x80}, 0xad95d8c1b7369e7a) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x77359400}, 0x1, 0xc2b}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 366.251450] FAT-fs (loop3): unable to read boot sector [ 366.254903] FAT-fs (loop1): unable to read boot sector 19:18:22 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x0, 0x70bd26}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x50984044bf1dfecd}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0xf30, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x4801) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RSTATFS(r6, &(0x7f0000000200)={0x43, 0x9, 0x1, {0x6, 0x3, 0x5, 0x6, 0x4, 0x1, 0xffffffffffffffff, 0x3, 0x9}}, 0x43) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r7, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:22 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:22 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000003c0)=0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f00000001c0)=0x628a99b9, 0x4) [ 366.405838] FAT-fs (loop7): unable to read boot sector 19:18:22 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x200000, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000200)=0x54) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') 19:18:22 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f00000001c0)) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 366.474708] FAT-fs (loop7): unable to read boot sector 19:18:22 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = add_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)="bb494904aeecd0af637dd435b0945b51d5fac7c6371532057c3dec2bded72c999457f62ba205d0a8b1e667cd503e50b245e2c941070e71388847ea3e0d98a83e1a6c4a97294a33a714c68a33bbb6cc2408171d71f1ff644498f425cbe262d7a84c46bcc74a886a0843602daaba5462833ccd9763bead15409e3cd5a018d70759d39d2ce1e292f60712ce3cab39572d844e371a95698cf18ed0e228ed86c326706196e26ff3f70ad14f11f4b12687cc853d3572f20126bc0a144b4518d9edf0a87fcf4d5ad5d7a5581a18200653d777e11d0c26ad2e10670107404f", 0xdb, 0xfffffffffffffffb) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000002c0)={r0, 0x19, 0x1d}, &(0x7f0000000300)={'enc=', 'pkcs1', ' hash=', {'ghash-generic\x00'}}, &(0x7f0000000380)="98b8f3660c0f294363ada851d3082d3d0be30184e560b625bf", &(0x7f00000003c0)=""/29) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400), 0x8}, 0x18001, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:22 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='\b\xe1\a\x00\x00\x00\x00', 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140)="6e6e0408b1d744f0c370d3656cd25bd3e5760a6a4901b367e7", 0x19}], 0x1, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000002c0)="f5", 0x1, 0xfffffffffffffffe) keyctl$update(0x2, r1, 0x0, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(0xffffffffffffffff, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x200, 0x0) [ 366.542522] FAT-fs (loop1): unable to read boot sector [ 366.566403] FAT-fs (loop11): unable to read boot sector 19:18:22 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 366.632627] FAT-fs (loop3): unable to read boot sector [ 366.697539] FAT-fs (loop9): unable to read boot sector [ 366.717913] FAT-fs (loop1): unable to read boot sector [ 366.729596] FAT-fs (loop7): unable to read boot sector 19:18:22 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$input_event(r2, &(0x7f0000000280)={{0x77359400}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 366.765684] FAT-fs (loop7): unable to read boot sector 19:18:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x58c) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000040), 0x4) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:23 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000001c0)=@filename='./bus\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='cramfs\x00', 0x20000, &(0x7f00000002c0)='\x00') getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:23 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="0e000000170100050005006275737d0825dc62b87154b2d62d282fb5e53b69238ce5e980b6e68d0dc0660186c22889b6d3c2ddeec0b3b575063ea2416b649747305fa9d826ee15185503b059870e2773996c1cee8a1756320dd558ab969fb7205f1ef7f21e2f99820ae8d0863f1fbd8b576f8d858dd744c5f233ec84a4dfc9a384b6cb48dd54768a0b33050ac4424f4922e80382916e8d0a2892ff09ca1c516670f17a3eb70c623e7ff1aa4936b7f5980be65f8d77f7bb4ce2989954b574ff25fb8c4253aec52b8ab9c7b3a8729daf40de2f27ca231c03a9ff00eaffa4c9d0fe936d21b67b62e35b9f8fefb41efe6eb9aa975f862928f20bb01bb2c707fad6fc4acc9b0c577d5a5d566380ac41aecb91d7c242e8dac8fa7733088a59810ae5a2cffea5a1638e88710c7a74cec7c88f50a08c1744a11162ce27bbf8ce3c33dbeccb0f175e4ff9fbe8810ea0c0cc68d4c2a2e7f385d907d861729b95349b1e968adfffe410d775066b086d0ed680d104b08d8e47f8ec4143112164419eb1954f6c7ecb57e6ac6b0815f36df1e9f9b8b4b8a88a1044316351211f21c1b83b2719e01298b9867a6201d33d51cba5d22dfcdb225f001d14aef60a89d49d796307a545261335c07efbd3551f1c902f8b92a4d37fe14a246b8917231cf63e1cd707648e85fb3fd72d0a7ca8e8a6926124be5582b60f9cbc1efabee32192e8ccafda69df7d"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 366.889313] FAT-fs (loop5): unable to read boot sector 19:18:23 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, 0x0) [ 366.934016] FAT-fs (loop11): unable to read boot sector [ 366.991971] FAT-fs (loop7): unable to read boot sector 19:18:23 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f00000004c0)) recvfrom$unix(r0, &(0x7f00000003c0)=""/237, 0xed, 0x0, &(0x7f00000001c0)=@file={0x0, './bus\x00'}, 0x6e) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000240)=0x820) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:23 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 367.018454] FAT-fs (loop1): unable to read boot sector [ 367.055548] FAT-fs (loop7): unable to read boot sector [ 367.063152] FAT-fs (loop1): unable to read boot sector [ 367.076812] FAT-fs (loop3): unable to read boot sector 19:18:23 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./bus\x00', 0x40, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x40) syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x80, 0x10000) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:23 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, 0x0) 19:18:23 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x80000001, 0x400000) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000200)={0x12, 0x56, &(0x7f0000000140)="ab46716cf84854335913532344fa62d23cec12b7971e082e35b6488dda09cd2e5598857534b3e2897504406475211bf7282287c59d78a8c632e02ef384c595960405d3cd38aea28d919091e33c7f200f45c97a8c0be0"}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000300)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PPPIOCSMRU1(r3, 0x40047452, &(0x7f0000000240)=0x6c1) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:23 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x8010, r0, 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000340)) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r3, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x20020446}, 0xc, &(0x7f0000000880)={&(0x7f0000000940)=ANY=[@ANYBLOB="940100006dda5b2a2dfd4cc47a416c9544016cdbce4cc332d9fe315118c6ab71af33351ebbb91b70383022b9c11843e20040f11f017f0870271c37e552f9f0f6183d75222e54be73ed71cfc93d6cd52d7b473f540a0c2d7109b25ac7917bd8e556388a365c9a144565f9bda3bc4f784ff8d9c2902ab0a504842d9ef43427e2c2d47c1e0f4b8e53f16b7369b657fa20a068d7f23af52f165fa0c1e8a08910b51cdc2af39a64b5239be93938d0c47d29d46496667833eed3c741cbefbebb6e347973f8a5da988473e709c19a21e7ed31069a4a61fe6b0c063d5bb1e81662e2f30757c1b40a394a91545cd0c741db2d3dd38bdec6997085cf02", @ANYRES16=r4, @ANYBLOB="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"], 0x194}, 0x1, 0x0, 0x0, 0x22}, 0x0) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000680)={&(0x7f00000003c0)={0x2ac, r4, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5a7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xcc3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0xa8, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff6443}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2c}]}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_BEARER={0x150, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x10001, @ipv4={[], [], @empty}, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2b}}, 0x4}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x8000, @empty, 0xfffffc00}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xe14, @loopback}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ifb0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x7ff}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x7, @local, 0x1f}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x405}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x2ac}}, 0x8000) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r6, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x24, r7, 0x800, 0x70bd2d, 0x6, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0xba96}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x22) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 367.118177] FAT-fs (loop11): unable to read boot sector [ 367.123576] FAT-fs (loop5): unable to read boot sector [ 367.157713] FAT-fs (loop11): unable to read boot sector 19:18:23 executing program 5: pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x6000) ioctl$RTC_UIE_OFF(r0, 0x7004) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0x0) setuid(r3) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) preadv(r4, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xd, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) r5 = open(&(0x7f0000000040)='./bus\x00', 0x20000, 0x8) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x9) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @empty}, &(0x7f0000000240)=0xc) [ 367.241405] FAT-fs (loop9): unable to read boot sector 19:18:23 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f00000001c0)={0x4, 0x9, 0x3, 0xffffffff, 0xffffffff}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 367.304137] FAT-fs (loop7): unable to read boot sector 19:18:23 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, 0x0) [ 367.344422] FAT-fs (loop5): unable to read boot sector 19:18:23 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x341243, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:23 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e21, 0x3f, @remote, 0x8001}, {0xa, 0x4e24, 0x8001, @local, 0x4}, 0x6, [0x2, 0x0, 0x26, 0x3, 0x6, 0x22, 0x4, 0x100000]}, 0x5c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdirat(r4, &(0x7f0000000080)='./file0\x00', 0xd79a0df24f518172) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 367.406574] FAT-fs (loop3): unable to read boot sector [ 367.445775] FAT-fs (loop3): unable to read boot sector 19:18:23 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000580)='./file0\x00', 0xe000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f00000003c0)=""/113) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000005c0)=@gcm_256={{0x303}, "b68aa7a1786f6099", "f0dadba172fedd18b8a4d897bc39a93714716aca68a57c93b702d21854d4dbd6", "10344095", "f0f42d05dc3f522b"}, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) r4 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r5) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000300)=0x214) setregid(r4, r6) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000340)={r3, &(0x7f0000000440)="d1ab87886e81ac410bbd021646214c0d91186e67c9eaff6974871088e98299a616be346f8c7ed1b4e24dcb8d2e2c9384bd140570833210ac7cc1e7f70784406a4347abb76118ef4ad2c763a536a2fa1dae930fb826a466c2296a2bf80ffb713ddeaab837b2cfce14330bacb128d8f2c14ff3d2ba02e4c4d434045b712743f5a2b694bd074085a9749ce3daf71a968530a0a801634cfbc8a303e59acf1e3233f7f78a", &(0x7f0000000500)=""/104}, 0x20) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:23 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 367.547933] FAT-fs (loop7): unable to read boot sector 19:18:23 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./bus\x00', 0x80, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000001c0)) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 367.607960] FAT-fs (loop5): unable to read boot sector 19:18:23 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0xa, 0xfc) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:23 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) recvfrom(r1, &(0x7f0000000140)=""/91, 0x5b, 0x2000, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @empty}, 0x4, 0x2, 0x4}}, 0x80) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 367.660940] FAT-fs (loop1): unable to read boot sector 19:18:23 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname(r4, &(0x7f0000000140)=@pppol2tpv3in6, &(0x7f0000000080)=0x80) [ 367.700248] FAT-fs (loop3): unable to read boot sector [ 367.727922] FAT-fs (loop3): unable to read boot sector 19:18:24 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)) 19:18:24 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x81, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000400), 0xd}, 0x4000, 0x0, 0x0, 0x0, 0x4, 0xffffffff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000000140)="1f1aa00c64abe7f3f44a1a783e560a156a16bc16354a79451131b05e3797b924d1e2b30948c0fe020f64e7d023f2ff22a2a783f42f4270357f287180bdc27afc48b9e0b98576fb66a12111121e1236a7eabb1989c6a1f486f9dc02baec87311adb72e316b5958b47018304c22f114074d3b1cc8b5d0f9fc222eefe94915dff9e5a2b8d72f4584f50c7500a3bafc37e660ca74c5cabf449802808cfd9b37153811739b45862f33231ea1447ede3370f6c05dd0f8fd747bf4c45080bd5cf5c173e9f22f214aad644801b0e813819109153e3eaa92b99a0a206a7130ec9e768a92df2c314425b722c144f71251e61d6aa64d09d") r3 = add_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)="8a7c5978251bd466539bbf9fbf02b93a73e42285560641dc11eaacac3fbe9a0213d5fc4eeaad4e9380b803ef04451227348e27a275d48534a33b771f7f9fd484a62a3a34c36a33410de7d1dca76b84d7c14804ded0209c3fb2d0c70e2eb300790a5931067cea72965517bad0eac7eccb9069aa32e721eedb98dc17fae4927ef0a431c8dee34e61ad0f27255af40634e9e7f106ee60269a62f4979101a66e04", 0x9f, 0xfffffffffffffff9) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f00000003c0)="8c", 0x1, r4) add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="455c3c04f6d39f05d8530eabeebc967fdf604f25b73b258cb17392638e7a35a5b83f45f0f936bacf34f7701171570d9857cc6707972b630c010dfe955baacae7fbd0a55d520d546bf82a2d66d0051cc6e4158d734cf3cb5542e5a0938e53263fb46c3153", 0x64, r4) request_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, 0xfffffffffffffffe, r4) keyctl$instantiate_iov(0x14, r3, &(0x7f00000003c0), 0x0, r4) [ 367.843269] FAT-fs (loop1): unable to read boot sector [ 367.854111] FAT-fs (loop9): unable to read boot sector [ 367.874075] FAT-fs (loop11): unable to read boot sector 19:18:24 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000200)=""/118, &(0x7f00000003c0)=0x76) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f00000001c0)={'ip6_vti0\x00', 0x81}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write(r2, &(0x7f0000000140)="21386c9212b085f589db461f0c5fe68c6c3be4def289c1ffd3746fd9482df691e9047c60c564597119dace98e70f5307ea0a794547cee084d5", 0x39) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0xfffffffffffffc56, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$UHID_INPUT(r5, &(0x7f0000000440)={0x8, "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", 0x1000}, 0x1006) preadv(r3, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000400)=""/50, 0x1a, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x44, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 367.925908] FAT-fs (loop11): unable to read boot sector 19:18:24 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) close(r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat(r1, &(0x7f0000000140)='./bus\x00', 0x101000, 0x0) accept$inet6(r3, 0x0, &(0x7f0000000180)) r4 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r8 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) mount(&(0x7f00000004c0)=ANY=[@ANYRES16=r6, @ANYRES64, @ANYPTR=&(0x7f0000000680)=ANY=[@ANYRESOCT=r7, @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="fe06feffc9bd819e3d1a7d7f739804f5429415622d90205d1af23e9634bf7e4e6a06884eb6ed6997fcb88f9258c49439a21b2578a78bf4ba464c4506bac6c0e27a011b3e6ca86b52"]], @ANYRESOCT=r8, @ANYBLOB="addeacf169e2916ab346e387779ee8f8ce73b75183b89e96d0c63eadd70e6df5b0a79e358ed6f2fa1b251a38eaedef91e083f8e1c093e8f82e8b14974997a26bb3a4e767c8be8376b811aa05a2d95fc54824c967c8ba26e4c9458fac35d6f8a5c2c0b76c1b33c155cf6efb4a56321efab11e222df2440669c36abc0f61fb6e8b4ba400c473abc6fac8df9cf7076c8220a5d0cb7a708f258cf974a0ddd9c28a098123591a6e11b1b2d289319fb122f618e69f0b65b7bc19035681f6a2d41738dfe5d7f2753c9e208c6cbbd0d0db4faca291becb269be75bea7f5eb5a21c07347e29a1", @ANYRESOCT=r4], &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='exfat\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r12 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) write$P9_RREADLINK(r14, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r12, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = dup(r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = dup(r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) ioctl$EVIOCGABS20(r18, 0x80184560, &(0x7f00000002c0)=""/189) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = dup(r19) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f00000001c0)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:24 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x2, @loopback, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKFRASET(r2, 0x1264, &(0x7f00000001c0)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:24 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)) 19:18:24 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) clock_nanosleep(0x1, 0x1, &(0x7f0000000040), 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 368.056556] FAT-fs (loop5): unable to read boot sector [ 368.063190] FAT-fs (loop1): unable to read boot sector 19:18:24 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:24 executing program 5: socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 368.174115] FAT-fs (loop11): unable to read boot sector [ 368.198893] FAT-fs (loop11): unable to read boot sector [ 368.269122] FAT-fs (loop1): unable to read boot sector 19:18:24 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x0, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000380)) [ 368.291732] FAT-fs (loop5): unable to read boot sector [ 368.302647] FAT-fs (loop7): unable to read boot sector [ 368.309402] FAT-fs (loop1): unable to read boot sector [ 368.325502] FAT-fs (loop9): unable to read boot sector 19:18:24 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1000000}}, r1, 0x8000000, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f00000002c0)="fa85ec8b03cd68a5f980c39650d641798da87f56116c5288e920dd68fdeed7d51639f203a00b9ba8f143d284fcab715c901fbda2820bf0e5d90c61599fa6d69086c9796bb646b51b28d1a05e1640cb0d0d7a9c2b650b7eceb9aff149099cba6cb38cbe3996e802cdf2f9061770c8823e0193d8d687fc498154fe3daefb37362023369ef74b104142b703c631480fb5f1278440b19e38c26714393377974b21d8910e7969205b932c3cffef5ab0f7749f9442596acad0e96798f2eecbb68f8ffc186126a6595a9ed901310c0556a5544ad4d054900dd0bb1716d20e678ce37b479f91be1920a8d806bc9fcedc14e0d2a204996d27b107a99b75adfd3245750e3a") clone(0x1c8c00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f0000000500)) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='d\x86\xf6\x86\xcbi\xb9\xdf\xf8\xa5\x00\x00\x00\xa2\x183\x1a\xb7\x1f\xa7\x15\x03\xe4U8\v \xe4v\x1ea`q\xb0\x10l\xc6~8\xa6M\xfe\x00\xb0&\x9e\x8f\xaa_\x96\xfeR\xcfzR\x90d\xc6\xd2\xfd\xef\x81``\xf7\x92;\x84n\xb9m\x11$\xa0\x8b\x8e\xf3\xc4\xfd\xb7\xb0\xd7{!\xecN\x85', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = dup2(r6, r0) ioctl$TIOCSWINSZ(r7, 0x5414, &(0x7f00000000c0)={0x3, 0x4, 0x6, 0x5}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r8 = getegid() ioctl$TUNSETGROUP(r4, 0x400454ce, r8) symlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='./bus\x00') write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r10) r11 = dup2(r10, 0xffffffffffffffff) ioctl$KDGKBSENT(r11, 0x4b48, &(0x7f00000004c0)={0x37, 0x0, 0x1f}) r12 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/status\x00', 0x0, 0x0) statx(r3, &(0x7f0000000540)='./file0\x00', 0x700, 0x800, &(0x7f00000003c0)) geteuid() 19:18:24 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:24 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, 0xfffffffffffffffe) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r4 = dup2(r3, r2) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x20, 0xa7, 0x7f, 0x20, 0x0, 0x7, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb66, 0x2, @perf_config_ext={0x1, 0x4}, 0x10222, 0x9d7, 0x4, 0x9, 0x0, 0x0, 0xe00}, 0x0, 0x6, r4, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCSABS2F(r6, 0x401845ef, &(0x7f00000002c0)={0x401, 0x0, 0x0, 0x9b09, 0x800, 0x1}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 368.367806] FAT-fs (loop7): unable to read boot sector [ 368.386806] FAT-fs (loop11): unable to read boot sector 19:18:24 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:24 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) mknod(&(0x7f00000001c0)='./file0\x00', 0xc420, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) sendfile(r1, r0, &(0x7f0000000200)=0x3, 0xffffffffffffffe0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:24 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x3, 0x0, 0x0, 0x50a, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, r2, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x17c2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x4008c94) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000040), &(0x7f0000000140)=0x4) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) writev(0xffffffffffffffff, &(0x7f0000fb1000)=[{&(0x7f0000000180)="4800000014", 0x5}], 0x1) close(r4) socket$netlink(0x10, 0x3, 0x6) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x0) [ 368.552614] FAT-fs (loop5): unable to read boot sector [ 368.575772] FAT-fs (loop9): unable to read boot sector [ 368.608680] FAT-fs (loop7): unable to read boot sector [ 368.628806] FAT-fs (loop11): unable to read boot sector 19:18:24 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000001c0)='bond_slave_1\x00') recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:24 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x80000, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r4, 0x0, 0x6, &(0x7f0000000040)='msdos\x00', 0xffffffffffffffff}, 0x30) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 368.660162] FAT-fs (loop3): unable to read boot sector 19:18:24 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) perf_event_open(0x0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ptrace$getregs(0xc, r1, 0x9, &(0x7f0000000500)=""/4096) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r3 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) preadv(r3, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) mount(&(0x7f0000000480)=ANY=[@ANYBLOB="2e2f766a51287f3ded12ffce97e4191e23fbf813"], &(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)='cramfs\x00', 0xa80020, &(0x7f0000000400)='GPLcgroup\x00') r4 = openat(r2, &(0x7f0000000440)='./bus\x00', 0x82002, 0x10) recvfrom$inet6(r4, &(0x7f00000004c0)=""/42, 0x2a, 0x1, &(0x7f0000000180)={0xa, 0x4e22, 0x43, @empty, 0x6408d806}, 0x1c) r5 = open(&(0x7f00000001c0)='.\x00', 0x8000, 0x34) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000380)=0x20000) 19:18:24 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) linkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000140)='./file0\x00', 0x1000) [ 368.729421] FAT-fs (loop3): unable to read boot sector [ 368.742838] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 19:18:24 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 368.788525] selinux_nlmsg_perm: 71 callbacks suppressed [ 368.788536] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 [ 368.843014] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 [ 368.863336] FAT-fs (loop7): unable to read boot sector 19:18:25 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x9, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000200)) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000040), 0xfffffffffffffd25) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) llistxattr(&(0x7f00000001c0)='./bus\x00', &(0x7f00000002c0)=""/136, 0x88) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:25 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x147002, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(0xffffffffffffffff, r1, r2) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) rt_sigpending(&(0x7f0000000400), 0x8) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/xfrm_stat\x00') ioctl$PPPIOCSACTIVE(r3, 0x40107446, &(0x7f00000003c0)={0x2, &(0x7f0000000240)=[{0x8, 0x3c, 0x5, 0x6}, {0xb01b, 0x4, 0x1, 0x6}]}) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r3, 0x6, 0x14, &(0x7f00000005c0)=0x4, 0x4) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 368.894631] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 [ 368.915875] FAT-fs (loop3): unable to read boot sector [ 368.965125] FAT-fs (loop1): unable to read boot sector [ 368.972244] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 [ 368.993115] FAT-fs (loop3): unable to read boot sector 19:18:25 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="8b1e524b76f59e19d477488b3eaee24a3435a6fc584c7cf8edea5bafc766a8f9475a7ea3f6ec9acd0a77a50fa79df877f20b0814b64c8dca8e46cf7e9750cd1a717c33559010de3aba40511fcde5639c8ac3b3bd78188b871eeb4f1623849bfc99e2bec4974c677a2d", 0x69}, {&(0x7f00000002c0)="a67bb4ce232b550a4088d1b6608bed984850fe29759e05d2cdd4f1f36db062f6449192223467a09ae50bc0476f23bca7bc9c9292edee040edfe0d8c3e24c2095dbf761a3f7a915b81a1b631d8c7817655e4cb675feb7519a43acd7651ae6ea9f509a7fac6d6a2cd68f4bca8e07dd9a8ccad022a1de116159430bf5bf394bb31f4575fa3d2d8c03b61763c48253ce9b19f6e27e1e7c7cd79f9ccb21e91d26936e869e917f2d862b3cfae60bd756d65ffc73860cdfa3d42a2cf8f8196b1d40454bcf4e2882509232a47e60ce0436dd8030", 0xd0}], 0x2, &(0x7f0000000880)=[{0x1010, 0x117, 0x656, "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"}, {0x108, 0x103, 0x1, "e8d2a65e7f4f9911424daa71608afb86c29e04dfa57a889d7f9b2c0339deab2e9a8cc85859b1a5786fa0c1864a1d5a55727b13a48e05b2fef7a8857b014d2df38434afe5b6de02cf62dd9f3ef266dd956b37697d267de1fc3addc694f991d7b4cb12442277cd6b17d8c3c336a8de822002aa384cf6ff679622f733e5c82ded7964a86c9cf233ad8cf1520ca99baa9b6bd52d067f0706c795489dcb23e6367579fb9148aaed91d7e9867a74f8616cc9f8fe5dc640c5785913b591deb468162c9befbb41bbbd2bdb86f3c2f6d09df66a1851e7f1dcdb540b3aa1f603b3ed974873fb0363fdec0c86455d038cf3bf5bd7fae5"}, {0x60, 0x10d, 0x3c, "4d51de2258041f1c5732cfb9edca98e2675ab0cd3bb85ba94fa3f98b9d3d301de041fafa6ebb6d2f2789b2d87c62479e045bd2b7ddc39a5e884bb8e8f1657af3b603dabf3d899c7a3d4d6e163b06e227"}, {0x38, 0x10f, 0x2, "da52ffba5317153c6701db836f39fe1e2961210ed75061e046ba3285c13da367b54517a0"}, {0x1010, 0x6, 0x81, "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"}, {0x100, 0x100, 0xc7, "9cc199cb40a6309a181e6bb8b68ba6130b30430cdb08e64016aa38771c8055935fdba3b501fcd2f7365440003168d2ced19fc5cc2f14ca29788269354e58e06c81137e8fb68b83bc8c701f1a23e697eb1a47b8e9475787fd999c381f29545b2b93903db989694f49839434c31a06261c3f1ceeeba81b1e1287cb4606ab61b3713d6d96747a73348cd7d4dbbfa1e8cba7ed3d53fae5cbf6f7793d9156ea57de3ff5174eec9eab695adbb392d9b48a65fdb6e7e20960d38ab5e83076a1f64b371df4062ffd9eb5aa7f44686328d71f621d64f910f813cc299a48c157be870a3f521a5677c21cc91c1b56bf43ccc62259"}], 0x22c0}}], 0x1, 0x4000000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) pwritev(r0, &(0x7f0000000600)=[{&(0x7f0000000200)="bca81357c0a797721e36634b521246f79ce7b8a5ca1c94a64d3693c8fad579b63da4564a32000df6eb2ddf3ed93363a1219041d5863050b4b496030fe8a4d006479cf991b4ec25e13554703744c0b9ad03fc0efd643ea831d3f5064a837e1f4829cc8987b817ebe5", 0x68}, {&(0x7f00000003c0)="bbe31e9ed1891fdf1f886177b77766cea8b86cf880f3d122e1caca15767335f99797ad869f360e20d0c651d636d2bb85a0db066a8e8c433fe9223b086bb11ffe34902c0c6c29bdf33dbea4a16967731a1b802db800da85c290ad59ddaa9e0678eaf7da35145f7f63dcc3eee10324f850f498e94801a90c5dd00e9c0d8d50a6dd27e7d4305f1559c253dd06704e8cadd50cf00cac1bedeaceb6f6a760c6e7dea616a3b5a8c84fcaae73988c71f9000a8aa54ba1bc959ea861bc303b658ea20b33bd2f903cb47674c82feccd1f02ea10c92b9801928924453aea6c66d49a33cf67c8354489b81a7a73", 0xe8}, {&(0x7f0000002b40)="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", 0x1000}, {&(0x7f00000004c0)="a8cd6fa56a6f2c574ea2b3211a768ef6439d768d061d9f2d0156f5503bea11f316b0dad77c2cdb3a7891da1cd416b308966ebaa51daade3aa989a813da4198730590d5c7296ce765c24dfefa0028a68ed76222b0247fae112ff778f72ce84ab4e037f6fc1a717db04d6c0dc05bc49a588b", 0x71}, {&(0x7f0000000540)="8b1e4ae19b0172437a5d9bc085e9fe5e27389bbfd4d7571adb6c802cc4511023176396704e5c22dc7692f593d05bd49591bf2c5b53a36e12cf317b8599201239cc90df348ec3b34c70a555addfee431fbf2ce99d5d2ea3d06d40753d4b4f7ddb5c84ea7bcec349bf41e212f0bc1c3208335e34255788e26476d43e4f6cfaf37d5e86fdddd728a2c5e49f558606ad744cadfa0426ca2cd46c8058805d8318c45d4fcd1899cb2a9bdaeb572cbae2f711f52ce354a9ad", 0xb5}], 0x5, 0x7fff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x2) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 369.014761] FAT-fs (loop1): unable to read boot sector 19:18:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x201211}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="00dae6a3476fa2f6bb446a000000", @ANYRES16=r2, @ANYBLOB="040026bd70003f000000120000000c00020008000100ff0f000030000600080001000000008008000100000800000800010000000000080001000700000004000200040002000400020014000700080002007001000008000100ff010000"], 0x64}}, 0x138479389db7a260) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setxattr$security_capability(&(0x7f0000000340)='./bus\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v2={0x2000000, [{0xc, 0x5}, {0xae7, 0x1}]}, 0x14, 0x1) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000300)={0x10000010}) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) write$P9_RREADLINK(r6, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r4, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 369.067693] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 [ 369.122021] FAT-fs (loop7): unable to read boot sector [ 369.122929] FAT-fs (loop11): unable to read boot sector [ 369.152121] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 19:18:25 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x101ce) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x180286628}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r4, 0x0, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x400c050}, 0x1000) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100204}, 0xc, &(0x7f0000000b80)={&(0x7f0000000d80)={0xf8, r4, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x52}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x8}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x44}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x2}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x24}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="23998a694dcfbbb855fc1ff46dfbc7ae"}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000005}, 0x4000) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4484500}, 0xc, &(0x7f0000000200)={&(0x7f00000003c0)={0x128, r4, 0x300, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x15}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffc}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xcb}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xcd}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x40}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x128}, 0x1, 0x0, 0x0, 0x40}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 369.172873] FAT-fs (loop11): unable to read boot sector [ 369.210164] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 [ 369.236139] FAT-fs (loop1): unable to read boot sector 19:18:25 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 369.256629] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 [ 369.345132] FAT-fs (loop11): unable to read boot sector [ 369.346615] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 [ 369.352517] FAT-fs (loop3): unable to read boot sector [ 369.413341] FAT-fs (loop3): unable to read boot sector [ 369.427964] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pig=21550 comm=syz-executor.2 [ 369.475067] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 19:18:25 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x31}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 19:18:25 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_buf(r2, 0x29, 0xd3, &(0x7f0000000140)="e88c332743d42d905c246f308458668b5e4f8ad0316cfdef3ca88e6837affc08b1aa81a5f8cdbe92c473805ca7861628a416b5798d652bef2212fcc3b2c48d021aa61e74b6bb1cbce93895b5be8cde3c2a749711861b239351cf38d5286d3438611be5c41c2c64db0371d48c2ae00fdf7db8ea337b3e321126e60edefe06857eb77821b3f7b221efbcb2b1102831dc652b478800bfee6b", 0x97) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000340)=0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x3, 0x2, 0x1, 0x8, 0x0, 0x4, 0x10, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000240), 0x2}, 0x4, 0x9, 0x101, 0x0, 0x3, 0xfffffffa, 0x3ff}, r5, 0x5, r2, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000200)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:25 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./bus\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f00000003c0)=0x6) r3 = dup(r1) write$P9_RREADLINK(r3, &(0x7f0000000140)={0xffffffffffffffe5, 0x17, 0x1, {0xf9, './file0'}}, 0x11d) recvfrom$unix(r3, &(0x7f0000000200)=""/106, 0x6a, 0x100, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:25 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000001c0)=""/36) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:25 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file1\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3b) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x7f, 0x82, 0x81, 0x1, 0x0, 0x0, 0x8, 0x10, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1, 0x5}, 0x0, 0x87a, 0x1, 0x6, 0x42b, 0xdb32, 0x7}, r1, 0xf, 0xffffffffffffffff, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) write$binfmt_script(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c653020216728657468305c20292628206d73646f73000acbd10f3a8c31ca4dc3b7d0e22dbebba008ec8ec2277482b962fd21403a42440664e67a01770a39013c3a917d132d99405c8ccf9a0911d5a2ce283c275d5cc305cfb9c78df631d5cb551321480aeda802d2dce10301"], 0x74) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:25 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:25 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) timer_create(0x0, &(0x7f0000000400)={0x0, 0x28, 0x1, @thr={&(0x7f0000000200)="0bb97a34752b3e165e73f43d8587da24a0b3bcdd5bb7a3a1e88a418edd8912f1f6568d9cec8e1d0b89f6c58db3489df24c49c4f9267b86d72326c5358b1ca72bcf3d", &(0x7f00000003c0)="44dedd6c3b999fd2eba66a28ab5ec4464c738d5b3d7365dd"}}, &(0x7f0000000440)=0x0) timer_settime(r1, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x77359400}}, &(0x7f00000004c0)) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x10301, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RNDGETENTCNT(r4, 0x80045200, &(0x7f00000005c0)) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000540)=""/127) lsetxattr$trusted_overlay_opaque(&(0x7f0000000600)='./bus\x00', &(0x7f0000000640)='trusted.overlay.opaque\x00', &(0x7f0000000680)='y\x00', 0x2, 0x2) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) io_setup(0x0, &(0x7f00000001c0)) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 369.586164] FAT-fs (loop1): unable to read boot sector 19:18:25 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000001c0)={'syzkaller1\x00', {0x2, 0x4e20, @remote}}) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:25 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x4000010, r0, 0x8) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:25 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@ldst={0x6, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 369.625033] FAT-fs (loop7): unable to read boot sector [ 369.640498] FAT-fs (loop1): unable to read boot sector [ 369.653044] FAT-fs (loop3): unable to read boot sector 19:18:25 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:25 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) sendmmsg$sock(r1, &(0x7f00000003c0)=[{{&(0x7f0000000140)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-avx2\x00'}, 0x80, &(0x7f0000000080)=[{&(0x7f00000002c0)="0d2abf14c7463e9769f52e7c96fa5bb8cc7d8583c13cc8a5c7927b85afe37c59aafc1275f114f3b6ede2880cb75f7dbc83f2a4ec4b67976795db36fefc56a5a724a83035994bcc655a15df3bb02199f6be0da27eeca5d099a56c68187bc7107fe61e650a4b8fcba7e18f508a61da30b2930a36e18d142204976a7c761430bbb3ee2ce8bf0e8bdec4cdc8901e74b1a09764f9768fb1918ecc7eb4001861060601eec83a1471a4c9ff47d81eb4cdcd5ca8f44d594acd0dc91ad9448586c0", 0xbd}], 0x1, &(0x7f0000000200)=[@timestamping={{0x14, 0x1, 0x25, 0xff}}, @timestamping={{0x14, 0x1, 0x25, 0x596}}, @timestamping={{0x14, 0x1, 0x25, 0x2e9}}, @timestamping={{0x14, 0x1, 0x25, 0x54}}], 0x60}}], 0x1, 0x810) 19:18:26 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f00000003c0)="0d727d071a04c8906e4c13d0a1781801062bb4e958a35fb5195754e0b27422160fef3bf1142a967ca0dc89bbe45d69d0e1b1479bd8a5601f4fa41e99daebc4f793a28f5f32dc111a0eb380aefa14005d2b791937a1bc147c7b656456332941c7d57da4f26b29efa8a3ffd845722e197b8b9e90ed6e347effada1ceddd9ed0e4e861ba4a6bf138ddb639bf6792ef0bd2722f23a64903e51da60465f14845d4e49d4be0ad427b3d6450906bf1e30125712cbbf9d8d2a86281b4a58921bfb786b4d90f2d4f65f8b95bafd8dae76a11ed9dd9be772300f3f36dc810de9583d793b819d09a7f35a") syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/ipc\x00') recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 369.782366] print_req_error: 82 callbacks suppressed [ 369.782372] print_req_error: I/O error, dev loop11, sector 0 [ 369.793653] FAT-fs (loop11): unable to read boot sector 19:18:26 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000040)=[{0x1ff, 0x67, 0x1, 0x8001}, {0x6, 0xd9, 0x34, 0xe045}]}, 0x10) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 369.854181] print_req_error: I/O error, dev loop1, sector 0 [ 369.861590] FAT-fs (loop1): unable to read boot sector [ 369.883776] print_req_error: I/O error, dev loop7, sector 0 [ 369.890875] FAT-fs (loop7): unable to read boot sector 19:18:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r3, 0xfffffffffffffffd) 19:18:26 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], 0x0, &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:26 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000005c0)={0x0}, &(0x7f0000000600)=0xc) r1 = perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x8) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3}) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xff, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x9, 0x3}, 0x0, 0x0, &(0x7f00000003c0)={0x3, 0x5, 0x5, 0x1}, &(0x7f0000000400)=0x80000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r4, r1, 0x0, 0x6, &(0x7f00000001c0)='msdos\x00', r5}, 0x30) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r6, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r6, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) 19:18:26 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000180)={0x7, 0x8, 0x6, 0x31c, 0x14, 0x8, 0xf9, 0x5, 0x1, 0x7}) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000002c0)=0x1c) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000300), 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) write$P9_RREADLINK(r4, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)={0x200, 0x81}) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 369.987557] print_req_error: I/O error, dev loop3, sector 0 [ 369.994671] FAT-fs (loop3): unable to read boot sector [ 370.009215] print_req_error: I/O error, dev loop11, sector 0 [ 370.015342] FAT-fs (loop11): unable to read boot sector 19:18:26 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x66, &(0x7f00000001c0)=0x7, 0x4) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:26 executing program 2: open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getuid() syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="17699bbf9e4872f10a01b956083b35d5a7dd227481d07152755c55a60b9d9402bc9ef3c78b9eb079b7e870ec54fb60dc56f96510a82253d5752fffc8c3d98898251e1bd491ea933eddfb98ef764ae19eb635db93215518a9748c3a1ac73e24284e02602479d7b79418aaa9", 0x6b, 0x5}, {&(0x7f0000000340)="4440adb689f197575c752fa5e503ae029481a1c5cf72215b081060f0fcac6842af0e862e47117923b0c01e236014f4275a10ed1482c88b1297cbe8d21d4c341970b2174724204d5fb0dbd1b9a1631e1c33261f6728c645425dd0fd659dba9f7fe7ec0578f61943448b1c127ab22263737fcb4ccec492dd021535a935f0b43cd773efd12464458188de0d8932894bed80b879ec25ee05768b0bd532e41ff2b0e63540a65c9ab622305e21c56fd766a1e12f84d33fb558c72b8deb16d6e3cb1327364d8458c1b18811ce", 0xc9, 0x4412}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1f0bd0c1710f89002258d437a25aabd2eca80d7f44ae9f357595807151f95952bf"]) r0 = getpid() tkill(r0, 0x9) creat(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x0, 0xc8) open$dir(0x0, 0xca00, 0x0) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x3f5) pselect6(0x40, &(0x7f00000005c0)={0x0, 0xff68, 0x5, 0xec3}, &(0x7f0000000780)={0xd866, 0x2, 0x0, 0x0, 0x0, 0x6, 0x2}, 0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000840), 0x8}) r1 = perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='cpu\t&\"6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba6\xae\xee(4\xe4\x9d\x17\b\xa7\xb0\xb4G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c\xde\xb5\x87\xe94Rz\x13\x8c!\xf0AW\x9ef\xda\xbd\xc6\x9d\fY\xf9}\xd8\x92\x84\xc3\x18\xc4$\xff\xc6\xc9P+\xdb]\x91\x19\xdcu\xf2\xaac\x8a\x995\x02\xc6\xbc\xd1\x80\xee-\xb8\xce\xfc\xde6\xd2\bi`D>Y\xcfau\x86\x1b\xfe\x97\"\xcb\xcc4F\xd0\xd8\xc9\xc0\x82\xeb\b^\xe5\f\\\xca\x86\x7f\'\x90\x99\xad+\xeeD%\xa0+\x9b\x1d\x04\x1e/\xa0I\xea]b\xff\xf8\xd5n\xb8\x06l\xac+j\xd2\x8e\x89\xbc:\x12\xaeZ\xf8\xbfP\x93\xcd?\xa8@\t\xc6/\xfe\x8f,\xe5\x1e\xefm\t\x95\ts\xdf\xa7\x19\x84\x15!3`\x8b\xd2m\x12w\x95\x174\xa0Q\a\xdd\x9c\x83AI1B\xe2e9\xd6\xb8\x9bM\xd1,\x0f`e\xfc\xffR|\"\x1d\xf3\x90;\xc2') perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) [ 370.104733] print_req_error: I/O error, dev loop1, sector 0 [ 370.113398] FAT-fs (loop1): unable to read boot sector 19:18:26 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) unlink(&(0x7f0000000040)='./bus\x00') mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_mreq(r6, 0x0, 0x11, &(0x7f0000000140)={@broadcast}, &(0x7f0000000180)=0x8) [ 370.164376] print_req_error: I/O error, dev loop1, sector 0 [ 370.170389] FAT-fs (loop1): unable to read boot sector 19:18:26 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RREADLINK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0ee70b380a6f4fe7b200617fdc1605002e"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+10000}, 0x0, 0xc2a}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) ftruncate(r4, 0xfffffffffffffc00) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 370.257545] print_req_error: I/O error, dev loop3, sector 0 [ 370.263988] FAT-fs (loop3): unable to read boot sector [ 370.288964] print_req_error: I/O error, dev loop7, sector 0 [ 370.295536] FAT-fs (loop7): unable to read boot sector 19:18:26 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) timer_getoverrun(0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) write(r3, &(0x7f0000000240)="81b20cce78af46", 0x7) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f00000001c0)={'icmp6\x00'}, &(0x7f0000000200)=0x1e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:26 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$cgroup_procs(r1, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r3, 0x400, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x200c084) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r2, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 370.316821] FAT-fs (loop2): Unrecognized mount option " ÐÁq‰" or missing value [ 370.343301] print_req_error: I/O error, dev loop1, sector 0 [ 370.349235] FAT-fs (loop1): unable to read boot sector 19:18:26 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x20000, 0x0) readlinkat(r0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)=""/56, 0x38) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) open(&(0x7f0000000040)='./bus\x00', 0x20040, 0x100) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:26 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], 0x0, &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:26 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000120}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)={0xb8, r2, 0x1, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4262977f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3d}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x5, @remote, 0xff}}}}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000045}, 0x40050) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f00000001c0)='./bus\x00', &(0x7f00000000c0)='\x00', 0x8002, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r3, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) write$input_event(r3, &(0x7f0000000280)={{r4, r5/1000+10000}, 0x1, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) r6 = getuid() quotactl(0x1, &(0x7f0000000000)='./file0\x00', r6, &(0x7f00000003c0)="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") recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:26 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0xd459aad112357142, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000140)) rmdir(&(0x7f0000000180)='./file0/file0\x00') r3 = dup(r1) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 370.528975] FAT-fs (loop3): unable to read boot sector [ 370.537750] FAT-fs (loop11): unable to read boot sector [ 370.564837] FAT-fs (loop3): unable to read boot sector 19:18:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) readlink(0x0, 0x0, 0x0) 19:18:26 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000140)=""/244, &(0x7f0000000040)=0xf4) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 370.582912] FAT-fs (loop1): unable to read boot sector [ 370.595929] FAT-fs (loop7): unable to read boot sector [ 370.621906] FAT-fs (loop1): unable to read boot sector 19:18:26 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], 0x0, &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:26 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000380)) connect$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) stat(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000300)) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 370.644831] FAT-fs (loop7): unable to read boot sector 19:18:26 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000000240)='./bus\x00', 0x0) r1 = getpid() sched_rr_get_interval(r1, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r2, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) prctl$PR_SET_FPEMU(0xa, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 370.727338] FAT-fs (loop3): unable to read boot sector 19:18:26 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setsig(r3, 0xa, 0x25) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$sock_int(r7, 0x1, 0xa, &(0x7f0000000140), &(0x7f0000000180)=0x4) r8 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) poll(&(0x7f0000000080)=[{r4, 0x2}, {r1, 0x24}, {r0, 0x18}, {r1, 0x2000}, {r3, 0x1000}, {r8, 0x200c}, {0xffffffffffffffff, 0x40}, {r2, 0x4060}], 0x8, 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:27 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x241, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000140)=0xa7, 0x4) [ 370.822970] FAT-fs (loop1): unable to read boot sector 19:18:27 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 370.911547] FAT-fs (loop11): unable to read boot sector [ 370.925561] FAT-fs (loop7): unable to read boot sector 19:18:27 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x808806, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) fsync(r1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000240)=r4) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:27 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) mount(&(0x7f0000000240)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES64=r2, @ANYRES64=r0, @ANYRESDEC=r3, @ANYRES32=r4, @ANYPTR=&(0x7f0000000600)=ANY=[@ANYRESOCT, @ANYRES64, @ANYRES16=r1, @ANYRES16, @ANYRES16, @ANYBLOB="e4b841dbe2c7fe997b16bad723cb70a93b24d863232caf0be5c95a77117c571212285e4ab132d37cddadb2a5b443e62888d4b5e3d66a371e0918484f0958616feff866cfb3", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYRESHEX=r1, @ANYBLOB="fcec006e355155ee11ebdf8c6aa6301e3acd9c68d0650dcfcb864cb844747b8fe4c6e653525f62bc2db05021f681920d11f347b54cb7fb024c811c70abf70905190b751a06b73bb9879c2dd58d2c20501b0ec6bb2750b129f21700d9e79754b9d74677cd7deef2cae5bb5d3234a20b4502daeab1bf88659c76bb200c6701130272a36b40a0e34b8a1116a8cfae63e68b942d0ec8e5d2bfc7510152c03e19586139cdb0110e4fc2e90cd60c32d9e138361ca4b84e3a4eae611e19afae4d735a571e550f83d57ff9a704e864a35cd12d90fa90fb6b4b36a543441b866a7d1f2c98707c118fc5b74bbc41b8", @ANYRES16=r3, @ANYRESDEC=r5, @ANYPTR64, @ANYPTR64, @ANYBLOB="23f1dac57ba808498267eea44809dc44ead2507a6b639d9a7533609f82cb72ede0d5f87eed4855150356e3ed6bad472038ccb117c74e4af504575f54fbdae44f3fd24161e9c7f0e0fd609c209cfde7dc4aae802ec205c09786524790c466cf777ed71e0c1c637b16fcf74cb984ef31a3f6b6a6495465748c9dd9da8e61588847a15cf17752b31326be46a12e976e3932441cc3234c1d1bbffe8c0087737208", @ANYRES16=0x0], @ANYBLOB="b83a55162c3723efe4f8a89d78fbbac0ac47a4e581ddb5e92b8a221151f96610f30d847d2a861b7338c47443534f78c5e070533275efdbd96b9d8788d64e8ab98ceaff6b18feeea93d20b8ca3b8a14b9fb16a2a3052ce2314c3202067169cff06a2236a612a53ec348b5b62cfdbc92f96aa6f791d373dee04254db6f8d", @ANYRES16], @ANYRESHEX=0x0, @ANYRES32, @ANYRESDEC=r1]], &(0x7f00000003c0)='./bus/../file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r6, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r6, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 371.063892] FAT-fs (loop3): unable to read boot sector [ 371.082365] FAT-fs (loop1): unable to read boot sector [ 371.126571] FAT-fs (loop1): unable to read boot sector 19:18:27 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 371.195754] FAT-fs (loop7): unable to read boot sector 19:18:27 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x88c8d102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x0, 0x70bd26}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x202000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x1, 0x70bd2c, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x10001}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x44000}, 0x28044585) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r3, &(0x7f0000000040)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 371.485304] FAT-fs (loop1): unable to read boot sector [ 371.563760] FAT-fs (loop1): unable to read boot sector 19:18:27 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RREADLINK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0ee70b380a6f4fe7b200617fdc1605002e"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+10000}, 0x0, 0xc2a}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) ftruncate(r4, 0xfffffffffffffc00) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:27 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RREADLINK(r1, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) r6 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000240)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r5, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x406000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x58, r6, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x556, 0x5cf, 0xfffffffb]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x3b}, @SEG6_ATTR_SECRET={0xc, 0x4, [0x6b7d, 0x7ff]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_SECRET={0x10, 0x4, [0xfffff13d, 0x0, 0x5]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) r7 = socket(0x0, 0x3, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x2de) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="400000002900e50d000000001900000001000000", @ANYRES32=r8, @ANYBLOB="00000200ffffffff"], 0x3}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth0_to_hsr\x00', r8}) 19:18:27 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00', 0x1}, 0x10) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:27 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfe82}, 0x58824a7f22f7aee2, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f00000002c0)=0x4, 0x4) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RMKNOD(r2, &(0x7f00000001c0)={0x14, 0x13, 0x1, {0x18, 0x4}}, 0x14) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet6_SIOCDELRT(r5, 0x890c, &(0x7f0000000200)={@mcast1, @local, @local, 0x3ff, 0x2, 0x4ccc, 0x100, 0x6, 0x6e34d4b0d475d42c}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_IRQP_READ(r7, 0x8008700b, &(0x7f0000000300)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:27 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x9) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) eventfd(0x9) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000140)=0x10) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:27 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 371.793282] FAT-fs (loop1): unable to read boot sector [ 371.799551] FAT-fs (loop11): unable to read boot sector [ 371.817201] FAT-fs (loop7): unable to read boot sector 19:18:28 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = accept4(r1, &(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000240)=0x80, 0x80000) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000040), 0x9163a4781d5e7e79) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:28 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0, 0x35}], 0xd59a4ff51ff6873, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x4000f09, &(0x7f00000001c0)="01e654f3af4029f5f0e309000000") recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 371.846572] FAT-fs (loop3): unable to read boot sector [ 371.864298] FAT-fs (loop1): unable to read boot sector 19:18:28 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getpeername(r2, 0x0, &(0x7f0000000000)=0xec) mount(&(0x7f0000000400)=ANY=[@ANYRESHEX=r0, @ANYRES64, @ANYBLOB="11080e7f30fe243c57eeb63c7531b11c3b939bba052840aab590a3ea8d10", @ANYBLOB="be38ec62e4bbd742960545a9505e912e285b9eb0d131edbbbbd94d36fbaf19d7ddd553ebb4c0f174d0d013cbe499c77b2ebef6f361019289c7519a41f136f6eca9db2fece7b80c1927345c7d2977146fb110bcf8912695e040b3961fcf61a9564f0e1952ae2b3d94220deb113c7c3857c632d2988872520431aaad245f26d8132de7d60b1309acf5d1cb8e0be3d0021f44217f5ce4699f2705c215084141ee73038558f9cfa2a4810c5f1efd1dd252d0a101c6221ed26001d047471e5b76e3ca6277647a3485dec980a51f73c2718cf155920a780fb69afb48b088f4d652b40a2c63f5ef06a2386fd165ba44c67564af09c9647ab9e1"], &(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x2000000, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:28 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RREADLINK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0ee70b380a6f4fe7b200617fdc1605002e"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+10000}, 0x0, 0xc2a}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) ftruncate(r4, 0xfffffffffffffc00) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:28 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000880)=ANY=[@ANYBLOB="f79c14364a0ac48c608cd209ef594f6dae4aca93af44e2b400d5eb4929a0caa0698c5948396af8dd14f38a091961de3562eb66773e6f77468efadf52c96d66cf86b9598cd9e3268745be6ac69c5a870f82cbd7349cc83a3bb5c3b4c469f12cc092b4004f5918d2e5b6dec3c988edadc940cd5bf54b3b7c71b6f783b1494a388b29ae9c67d2686de0de434658558830c49f4193b8b6254b774661a2e71e95a3e433e0f25b3cfa22de96579e915c344c20f6d125ee1418c4f8a728ee5ae07f1cbac4708f462bac8aa654b6766d4c4d21c832df53b0ca65f647656be7028fde606738cbf976ca489cd345f64413ff0a2c331627d880272e9a2f8d1bdc2efe7ae7a0e0c73ccfb27762b8466f5c62c84d203329feaf64b97a06f12cbc7fcac49d5cfea305fab7b766da35b24bfd989fbe310b8c7883daca9360b11556914fb1d0fe650df16261d788eb529b65e60f85d5203958d4a8756d9cff691499c25072d10b581eb7f7bed1c517518622971aa2396c7d62bb03b8f2e51f51845c990510d2b501dde5426a81d3fe7607cae8c0f0ac1806d45bb3292b4be0b7cc88ccb475f308dd174ddf0a9d3e6fa96573c100b0ce134659800c2f56609c26ab96bb4e31fe50f94d06057f50835cc3333cdfe7db02ece6ba231ba0979965551bad5af54234389e6b72fae2c17e19912817cca373d5223eb40dda363649d11fc3d5b7dd6cfed6e96e6f7c6744c79288e1c64e34a86fa55b2aa44a9588d4825ed77cf5861273cfa05ac8b7ca4ae3d7f09d1472351610759f9975ba9a2685e277a5ccf230fe15535ee64f42527dc17f87f7ed70105df55dbf5be89ce95ef7c21e5133954f946fa018d56d0bf38032295ff6e7a3b2aac13ebaa3e94aa603b3791826716cc1ba6dd9d509bb043d22ebc334450e66b266ee0718ec445d80daf91a8d70e61cb12d567c9fc02de88d0d51d32676364e690efd028aa9ef827bd2d879246d19382bf2dd8ea5fb5acf6548294653056e5f433bdfc891c6a8fb50bbccf413bab6ed2932138e1594578aee09047944996106b07e72f9d7e0ff2ab1080cf65ff3cbfeea3916b9561fa76917305927677761671312b81ecdba935d907f08bf3ab1cf212eb3c42a6accb9ea7642137bd7144dea41d3333c027fad798230412b3c5b851601147778ae6a93eb84e3c359286eeadff13a2b486985bed06a8117f10da3d41b6e8b45953e8797b84e61c0af088dae955d9cb5a3ca1685d1c46d8623551b75b1675006c0e2bf9ea0010ddde92c63240a0b7fec78664d8d95ced0839dd88ad65d18826454150a4ea53409c54bb5f357f6a1864e90d57368a256290cbae7bf3987c03a1a562142a1ad5340ea29ff470434db645f5af060fe12c14b687acaaf9e746f15f1e0a57608137d24ba42fbdda277ded64a1962714880b639e9bc46cc65157ca386501125bf0ac8ef77b65bd3b5ccaeb94c5d13d62bd6bf78cd7fd3fe32b0991262b26bd3c013ad14dbcbf27691b7fc319faae58ee759810fa86896856e432c760bd2a7747a903a0149d2535327298ad736b52cbb44c922ceb4e21cfd25c84cf01014b6d90125143214a0d2d4f208c3de30a0bfe2d12d4023e41e86858334a8d16b56fd92ce501ca84476c16a8daac878c5a659577939c787ef558ef856550820d24a5fb590e01290500b95c6fbe6bb0de024affda738032bcbe39de888a68b11266666427e5c2388526bb0ce63ec328279d4fa0a8c48b107ba025071b3c5ef483e3464ac653b35ad0e9cbfd91550da5e1d0acde9d389ed773e47b3e2f953a43553eada8f59d58e070c0f327d1ace247aa611f900a83bdca0699c23750ce0be8b47f1586da5911fe8be2084425d75ec78daf37814cf11ce7908ee86a964bae910c0b53f3c18d6638689ec02f78b1ec19e6fe3b3a79e2c9847f7a8c61f521262a0918cd5d3245bfa7bf61c597e6438da040fddcf4a3692a41df14f52a2f521bb88099b6c79cd4870539ebb32d46fc408db0d6dd5ab0c50805dd381d246808fbf3ff07410ec43fe1c8ae018c379d8478f33683cd01d86fa612a815daf69e16a7100a31fab47b5f699c4dbd4714c7ee64240b4f17dec1343c9a9aba8872680ca3c38425b9498aa8e568ef0e766757bbf45dcc0a482f141330cb84ae72796372dd33eb232151c8f0892b2c2f43b0ad99adaf2c5285d4232afff9ac2f4cf6c04db093fd0c7539baefb7bc7ca69e327aae7441ee63852578067dc876289cf23b6cc8bde597f6a81274c3589bc04cb29204391342a232687bdcf104c42cfb8670d07c248ee810973b1661b10fd527b7beb00cbaefda46200a9e3d3c7fbc91a8c2efe4b3db77bb1905de4a680e9e4c5e359f2535b33ee2954d24f5718bc3541a1189c3b14aeb5e1503b4752c93027d4fa6f0b67f5f51c2f55b665cdd16dfd15e9412438a0481e15d2439b2c76ca5432a171a549a2a163017d74f6197de3625af48026b8ae96b1844c3c2feb0e206c1215d0484202df9cb20dd1721545e47fdfbcca84df18271f5912d154c35cc3dfad227cf23bb3626230bc5493345d9660ddc4b165ac01592b6adc9e5637520673c33258365e8214cad1e0e35f0336c91bda97ed992f82524ae4b793b514eb232262e573902ba9e927693e0a15c374d06fe7c57dc578e41e04b3805d4bd61d5c754dd3363282695ae881b1ae8e0785ac20c8885baa8c13a056120892c8cc91e87f0c77011b7625302f8f80a12c5eaf6f6f8e2a9e43021311722a422b35d5e104be2cccc0da3aaaf7615c807cd48e4972f646260cd1abf882caef54b0b1e0c3edc67b7a211c29477e18694c64e8b81ec51cf627c22d2d523d0edccfc5e44ab8391536c9b98802c51c6c5c909dbd8dbf8ff2b393a48f883276f089f60cedfcf65da7f9b8045ab74855f73de00d337e45ba72488f8deef3ded20eaae6b2ee570f3208ac5babf3a560f2d6177e2068ffe3fb8e9944fd946fa0dea8637c6f39eef31d309056563376f027d43c26eb9f6e5ed24ab89a1347cfdedbfe43f9469cc786680c7ac16057b73d0c7c47e5305de699122ce152ae40715230ae8430ac2a55d2ee8f48726fa0c8734bf2ad936f6f502f1bb8a3c2448df9d0a59bb0b7cdd7b51ab43b98af6d2f782d3638fae7113b8218b1bd263ad48323292c00d40ee798e48c9cee713127d880a99de5cb99388479db8d0753aa786d59e0c22fa8c7300b69a1038b00501a158960406763af1e1dfd07ed7ab74f66f49db07afebd98d8ef87bde664ec229e0b857e4ea645405bd9be69f373903add3dfa00666bc9817b3aa94999ec14ba34d6919541d48b1edccc6c3a718cfc2d8263a23c12762254ae0c7720500ea36a8d3f974f3c91b634ee857fd273fded5bda364b9d1080e70d7aaffb323d806d358c4efb32410cbb988c7afa5ee745d02b260c5911697759e53b68b0ec0dd55f3a880cc2851d028f688faf601fedc927360b9f231abd30aa4049845b74517e9d17536f36e2f70fd9bacc914b868a9b001674e6139731e9b95833e859df8dfe905d6c56ec7d12adb1829cef1e90ad6476cddbb4eb20ffb0ed5e620416615b997f55c5ef928a1052af4af38ebbd81191b69e931c299ad36baa8ee5f4ff01c619477729a09f9411d77e3a6c6738f9b42c8bf9f44a0408493efaf6f13c9dac306feeb25706847918d0b72e6a34596f668f13d7e76228cfa31ea451032784a550a856b6b68428bea96f07bf113bcb061303a147fa15720d3fc687c222eb7bdd7a6cb5f2b5927ea0954e61f440f8f4b5a5860ffa24802dcd40ebf26d86e4892d6693a17b1fcc6c4be781f57a4e3b4bab7aa71a5ccef8ada12d807ffea27ea37d4f7e207e69828f4aeff95695dfb7e22dbf0a18b05e224e12e13b081f579417b493045d606d2c24201478cfe9b519826b0c6f503f9ddda91c2c96dd5eacf2c10c20f5d6e56da4273713ad435dcdb2333119ff5bc4e2bfc03725c0097d21a9a96f13a94124cd0b4a5fd3cd52bbca670db0bfec541cfa4ccacb95e6e566d351f3d5e7255db2d175f4a1ed15d7327a6a182ab48319671fb0e747a8c097e73ad3d55cfb66df2dec71c3693606cdc26e002e712007f7bcab5335a3bc6607e0af98f9b16aff2640538094c1b38406e39ce1556f510ba7922fb092e50b5ed0dc2fea428da1b94044d0b5156fa2cb09ce3af21ffbb963c024dfc1097fc20ad5a486c55c9bb91e12a79c6547ea32e3b56d842150167a3dd9fbb4b51fa0cbd707d044dbea20ae2c40a4ff59548f1e9cd3949951f2fefa6330836cc73d8d976d5e0b5165068f416ba9d94c6063c71ebbfe6d0e0d11afd6472ce28591bee467bded8ce1282785afb716af3419a1b846fe7bd50e6d30330b14c0b50ae1a27b498c2585a423479aaf4f49c072e6cadc7947688255f1e1a0395df23966bd95f352db733a3690cb74c333d8df56b23af79a580b8b76f5abe6eeb104724a150c96d4e095b2b76d02f48b677f215d4ae7477a3ba17447e792addef5f91a8a5888ddffae7af71f398d86de40befe99b429aab5c38d3a10885aa81cb59027a6f984b88d461c0cf6be986fa3101a77a80880b2eecacae7df52cc6f9f5b650dbc0e7387b0b9a6d75900ffcb83302f8f8d3356b4ee2ccc48c938908fa6bd2765252d27947a100a5979237e59929bdf4f50d913250e8de8ad479c1080375bc878d2fa0191489dbaa0ecb28a612df7c5956414dbaedebd53cd44c456e690c76874d2822b82f34f1ed26a2621c33868742de22e01b6f41875db9f268f530a008fe79e1c03f67357a6157416fe0196104360dd8ef4a9a1953941ec6ac2e5731ff8bb9e17e960b8a3d52c341f65bf902fd5d27e9575df64279c601ac41ec1e1df837a6d27167d2d60a174c53bbd79d33ca8cb907ffa76f2d7e1f56137634109f8a7ddaf81fcd26b4dabc80de6e5550efce37d996962bbbf5b098b0d242fb8779acdc5cadeab3d19f6aa7980d904376fc59bb98d51d0270bb79c42b9ae6f51d62ac35f3f1f186213bf09fb320bc63249e701f81a3a9dc96083df444c981f38bd53bfbf115959d52fe4316f72a338ca9e490264de1ae43375fd0b3ec23dc9059e07f27a4a84b5a685e68d97a82ee40513d06c67ce2711491fc6e3b8245c241b2768ece1f41fbb98245223c740a5b6d0bfb4d9db4701e322b271c5b42285c5d449c2f3c8f19c735b668e221b6a14ef719c89ce2cd43fcf305e3379e49a655370d350e5e0b32110be6c89ad4083615fce112b9ff661380490c495e2f665a7dbf6d7c5750f8826724c52661118852dab2675e2d7fe90ea78962b76d821bdb9cdd307136f2e93a500379b550dc0f90f19ba20f7bb2b10b2252679ba6af1611286e22d68e02611162ed0d586aebc7c46344e9194285d1469cace25a0f91a838db3e3e7da0fa8f29ff32b107d90d502e508c249d7ca68c7920b47a0facc11c13f12d8250456bf7351a195ed1bd5653ec2084c36ce967fada038a4d3512e57d038be8bc23b359195f5bc8b5a29205ddba2b6b7b706b73dbb0744ca260dff6a645126ed2c872cacd548932bc06c12b166ade7f2cc0e5858ddcc4b5119b95c66dfc1fa7f3904fea1afffc2c27f7d06e30abb288bd9487ec70eb4d804d7e2654c6712b569cea0123d13642e77e76aab570d63a872071b26539d7dcf14e18ca8fe8248131f466e9e75157a4a303901a30d4123795e03dde5eec30984645e38b5278517d0fb99a4712953262f52871a2e302d1e8c591ed53370a50b8c21a7b77b10f3df883e473972d8de103b361bd068", @ANYRESOCT=0x0, @ANYBLOB="ca57a812555ab38619089ef9329e805d169c944672cf253d4a734cebc676819dc1bee3104379ad4c8a5e8e13ae14de76fa2ed59fc6024c63dc4d6062976a0772c43350cc33bf1c0f396d6df5fadb730a77c5c89614dd74ae587c720e9c1cc5362fec0bc6ba7c0829ccabd4ee2fb386fabe89a3dc9373d137a6510494c4c60e50a66cccc8c149e18963352a402fd74ff3c62a73e6ca4dfd57fba9a5f11de3751ea87b5a3ff686e1e9ac1fcdddd238f235fbe417ef10d836a203a7121272bab0a8159b72b5e4aaa964b3e53d7294934dafe8bd980fd3c8f0ee0b783889e4e5e2", @ANYBLOB="d26157b6f4e86a1193d70915631f94e5bc971857df88b9cf013e9f06fe211e3702c256a667acf3f226c0ce3ce9d54ff8eb4d128cf60893da02ad13edbf771941ac476c9949dfa83cd55f71a8a3ea7ee8d0fa3f144f33fb46dad548fca5739f57423e6a9428ed5cf7d1ed167a52e2816c25efc05ed09aa00e7053febd244ad5df8d5ba25c7d6f7b6a3eb1207541ca8dee605d68506924fe31e997", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESOCT=0x0, @ANYBLOB="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", @ANYRESDEC]]], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000180)=0xc) 19:18:28 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200)=0x1, 0x4) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f00000001c0)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RREMOVE(r5, &(0x7f00000002c0)={0x7, 0x7b, 0x2}, 0x7) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x47, 0x82, 0x0, 0x80, 0x0, 0x8000, 0x18000, 0xf, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000240), 0x4}, 0x8, 0x20, 0x6, 0x8, 0x2, 0xd2, 0x342}, r3, 0x3, 0xffffffffffffffff, 0x1) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r6, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:28 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 372.133277] FAT-fs (loop11): unable to read boot sector 19:18:28 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000001c0)='syzkaller1\x00') mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r2, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:28 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) write$P9_RREADLINK(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0ee70b380a6f4fe7b200617fdc1605002e"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) write$input_event(r1, &(0x7f0000000280)={{r2, r3/1000+10000}, 0x0, 0xc2a}, 0x18) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) ftruncate(r4, 0xfffffffffffffc00) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:28 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="0e000101000081ec05002ecc3f62"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) execveat(r0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000200)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='msdos\x00'], &(0x7f0000000500)=[&(0x7f0000000240)='wlan1-!selinux%\x00', &(0x7f00000002c0)='-:cpuset\\\x00', &(0x7f0000000300)='msdos\x00', &(0x7f0000000340)='msdos\x00', &(0x7f00000003c0)='GPL]+\x00', &(0x7f0000000400)='msdos\x00', &(0x7f0000000440)='}\x00', &(0x7f0000000480)='msdos\x00', &(0x7f00000004c0)='vboxnet1.$cpuset\x00'], 0x400) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:28 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_ro(r1, &(0x7f00000001c0)='memory.events\x00', 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000200)=0x3, 0x12) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 372.368234] FAT-fs (loop1): unable to read boot sector [ 372.387389] FAT-fs (loop11): unable to read boot sector 19:18:28 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000001c0)=r2, 0x4) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000140)) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socket$packet(0x11, 0x3, 0x300) ioctl$KDDELIO(r3, 0x4b35, 0x4) [ 372.425779] FAT-fs (loop5): unable to read boot sector 19:18:28 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) mknod(&(0x7f00000001c0)='./file0\x00', 0xc420, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) sendfile(r1, r0, &(0x7f0000000200)=0x3, 0xffffffffffffffe0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:28 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r7) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r12 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) mount(&(0x7f00000001c0)=ANY=[@ANYRESOCT=r1, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES16=r6, @ANYRES16=r0, @ANYPTR=&(0x7f00000003c0)=ANY=[@ANYPTR, @ANYPTR, @ANYRESDEC=r7, @ANYRESOCT=r8, @ANYRESDEC=r14, @ANYRES64=r3, @ANYRES16=r2, @ANYRESHEX, @ANYRES16=r12, @ANYRES32=0x0], @ANYRESDEC=r11], @ANYRES32, @ANYRES64=r4, @ANYRES64=r5], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='m,G\x82YH', 0x200000, 0x0) r15 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r15, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r15, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:28 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 372.503118] FAT-fs (loop3): unable to read boot sector [ 372.523731] FAT-fs (loop7): unable to read boot sector 19:18:28 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 372.652987] FAT-fs (loop5): unable to read boot sector [ 372.662984] FAT-fs (loop1): unable to read boot sector 19:18:28 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0xe2a0101782b082fb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:28 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) mknod(&(0x7f00000001c0)='./file0\x00', 0xc420, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) sendfile(r1, r0, &(0x7f0000000200)=0x3, 0xffffffffffffffe0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:28 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:28 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x2) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) syz_open_procfs(r2, &(0x7f00000001c0)='wchan\x00') write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x17, 0xc27}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000200)={'nlmon0\x00', 0xa7}) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 372.701640] FAT-fs (loop3): unable to read boot sector 19:18:28 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) setrlimit(0x1, &(0x7f0000000040)={0xffffffff}) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e24, 0x8, @empty, 0x81}, {0xa, 0x4e22, 0x0, @empty, 0x9}, 0x100, [0x5, 0x1, 0x1000, 0x9, 0xfffffbff, 0x0, 0x5, 0x7]}, 0x5c) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:29 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:29 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) mknod(&(0x7f00000001c0)='./file0\x00', 0xc420, 0x2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) sendfile(r1, r0, &(0x7f0000000200)=0x3, 0xffffffffffffffe0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 372.813695] FAT-fs (loop5): unable to read boot sector [ 372.821542] FAT-fs (loop9): unable to read boot sector 19:18:29 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x3, 0x0, 0xb8, 0x0, 0x0, 0x7f, 0x38440, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc, 0x0, @perf_bp={&(0x7f00000001c0), 0x69e97f2079613bf6}, 0x100, 0x1, 0x51, 0x8, 0xffff, 0x3, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5076}, 0x0, 0xffffffffffffffff, r0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) syz_open_procfs(r2, &(0x7f00000002c0)='net/ip_tables_matches\x00') ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 372.875500] FAT-fs (loop7): unable to read boot sector [ 372.898996] FAT-fs (loop11): unable to read boot sector 19:18:29 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f00000001c0)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 372.960605] FAT-fs (loop5): unable to read boot sector [ 372.984702] FAT-fs (loop3): unable to read boot sector [ 373.007947] FAT-fs (loop1): unable to read boot sector 19:18:29 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:29 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f0000000e40)=0xe8) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r6, 0x4c03, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000009d40)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000009d00)={&(0x7f0000001b80)=ANY=[@ANYBLOB, @ANYBLOB="000226bd7000ffdbdf2500000000", @ANYRES32=r3, @ANYBLOB="bc00020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="44000200400001002400010071756575655f69640000000000000000200000000000000000000000400000000800030003000000080004000100000000000000", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB="3401020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040001000080080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400e300000008000600", @ANYRESOCT=r2, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000038000100240001006d636173745f72656a6f696e5f636f756e74000000000000000000000000000008000300030000000800040001000100400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000300000008000600", @ANYRES32, @ANYRES16=r5, @ANYRES32=0x0, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400fffbffff3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="f800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000410203000b0000004b0104000900000008000700000000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f74785f686173685f746f5f706f72745f6d", @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004005e0f000008000100", @ANYRES32, @ANYBLOB="c800020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040000000000080007000000000044000100240001006d6f646500"/98, @ANYRES32=0x0], 0x1d}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@gettfilter={0x30, 0x2e, 0x10, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x0, 0x4}, {0xa, 0xa}, {0xb, 0xfff2}}, [{0x8, 0xb, 0x3}]}, 0x30}}, 0x800) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r7, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 373.033654] FAT-fs (loop1): unable to read boot sector [ 373.053405] FAT-fs (loop9): unable to read boot sector 19:18:29 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(0x0, 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:29 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x800, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 373.144633] FAT-fs (loop7): unable to read boot sector 19:18:29 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) getpeername$unix(r1, &(0x7f0000000200), &(0x7f00000003c0)=0x6e) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000001680)=@dstopts={0x87, 0x0, [], [@enc_lim]}, 0x10) 19:18:29 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x3000024, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xa0000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140), 0x4) [ 373.287206] FAT-fs (loop9): unable to read boot sector [ 373.304152] FAT-fs (loop5): unable to read boot sector 19:18:29 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xffffff38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x7}, 0x65018ff746684fec, 0x0, 0x0, 0x0, 0x3, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) write$selinux_attr(0xffffffffffffffff, &(0x7f00000001c0)='system_u:object_r:ld_so_t:s0\x00', 0x1d) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 373.347418] FAT-fs (loop11): unable to read boot sector [ 373.394522] FAT-fs (loop11): unable to read boot sector [ 373.403419] FAT-fs (loop3): unable to read boot sector [ 373.430692] FAT-fs (loop3): unable to read boot sector 19:18:29 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) fstat(r3, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000001c0)='./bus\x00', r2, r4) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:29 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="0e53c200000717010005002e2f627573"], 0xe) utime(&(0x7f0000000080)='./bus\x00', &(0x7f0000000140)={0x88a8, 0x7b6}) io_setup(0x1, &(0x7f0000000200)=0x0) io_cancel(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x8, 0x1f, 0xffffffffffffffff, &(0x7f00000002c0)="d6c857ac01aca68f844ac9e7559ccbee8acdd52e15fa052082861ff7d4b8ddc4928caafc45ffe97a7d80fc05d7e75688012411b2d1f9353452a1cb18ebd9f342b35348703c263a3579461836bb85bd17ce6e869d26e011d8b3bf53baed6609df9669", 0x62, 0x3ff, 0x0, 0x2}, &(0x7f0000000340)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:29 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000200)=ANY=[@ANYBLOB='/devc\x00d0\x00'], &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='exfat\x00', 0x50a0, &(0x7f0000000300)='vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00') getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000001c0)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000340)=""/47, 0x20, 0x1, &(0x7f0000000380)={0xa, 0x4e23, 0x20010045, @dev={0xfe, 0x80, [], 0x17}, 0x448}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:29 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:29 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3b) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) r5 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r5) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000540)={0x0, 0x0}) getresgid(&(0x7f0000000580)=0x0, &(0x7f00000005c0), &(0x7f0000000600)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f0000000640)=0x0) r10 = geteuid() lstat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = gettid() ptrace$setopts(0x4206, r12, 0x0, 0x0) tkill(r12, 0x3b) ptrace$setregs(0xd, r12, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r12, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@mcast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000740)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780)={0x0}, &(0x7f00000007c0)=0xc) fstat(0xffffffffffffffff, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000001a00)=[0xee01]) r17 = inotify_init() r18 = socket(0x10, 0x6, 0x4) r19 = socket$inet_udplite(0x2, 0x2, 0x88) r20 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r20, 0x400454ca, &(0x7f0000000180)={'vd\x7f\x00\x16\x00\xf9V\xdbZ\xdd\x91\x80\xd2{\x00', 0x43732e5398417f1e}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r21) r22 = openat$null(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/null\x00', 0x0, 0x0) r23 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r23, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001a80)={0x0}, &(0x7f0000001ac0)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r26 = dup(r25) ioctl$PERF_EVENT_IOC_ENABLE(r26, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r26, 0x0, 0x11, &(0x7f0000001b00)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000001c00)=0xe8) r28 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r28) r29 = gettid() ptrace$setopts(0x4206, r29, 0x0, 0x0) tkill(r29, 0x3b) ptrace$setregs(0xd, r29, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r29, 0x0, 0x0) r30 = getgid() chown(&(0x7f0000000100)='./file0\x00', 0x0, r30) r31 = fcntl$getown(r1, 0x9) r32 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r33, 0x0) r34 = getegid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r36 = dup(r35) ioctl$PERF_EVENT_IOC_ENABLE(r36, 0x8912, 0x400200) ioctl$sock_FIOGETOWN(r36, 0x8903, &(0x7f0000002200)=0x0) getresuid(&(0x7f0000002240), &(0x7f0000002280)=0x0, &(0x7f00000022c0)) r39 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r39, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) fstat(r39, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r3, &(0x7f00000023c0)=[{&(0x7f0000000140)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000000040)=[{&(0x7f00000001c0)="705144166fd190d52d76ad034d7bbfe6436b08c085319aeacf7f06a268d63c3dd9ed04501ff196203ff557c3614bbebe2dec96904ba8676c178c66b87bcc98160f66410ead98df1aa033244858cfdf5236b32db426cb08a91dde4c593c", 0x5d}], 0x1, &(0x7f0000000240), 0x0, 0x4}, {&(0x7f00000002c0)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000340)="7bf178135b5d2e33de601ee567b5e917491043858b68283aa5bc41247ca44cac407f19c60cf28e6aab58c140b620c4aabbc90f3a1a7f3d4fd47d7743b619f8037c291e6a83d78a891250117c81a942d70b5c9b83cff7e895461dab7fdfc61673468419044de0b91b644cd23abb08c1b9e5115b3b6cc81e826c269dddb8dcf19fae1f19", 0x83}, {&(0x7f0000000400)="9ba60b2e45f9dda7807328ecbb7ad87b5f41a4360c5d179144dbd421c261d6da3bf19e1437d89e156833b863c0b43600b717e88b2603916c836da8582ec1cf09ca8ebc3948ab7c435ddf17b62becd377611a58eab3c85fb3f448bd1af5105d47eacf88dcc4288c91443467617ae2a5e609d1b59e13d2aac0c7df2e5c79fef75fb813326b7540ecee7db781007f0d52eda2af9e6cca16b63df37335d1e04508d5888cc7c08bc90e012671d03bb429bf93892fd0e4cd25df0f92f1756fbf411c0393ceb79c9db0ee0b2ac8d803d37a", 0xce}, {&(0x7f0000000880)="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", 0x1000}], 0x3, &(0x7f0000001c40)=[@cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0x0, r7}}}, @cred={{0x1c, 0x1, 0x2, {r9, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @rights={{0x1c, 0x1, 0x1, [r17, r0, r18]}}, @rights={{0x24, 0x1, 0x1, [r19, r20, r21, r22, r23]}}, @cred={{0x1c, 0x1, 0x2, {r24, r27, r28}}}], 0x108, 0x40004}, {&(0x7f0000001d80)=@file={0x0, './bus\x00'}, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000001e00)="91", 0x1}, {&(0x7f0000001e40)="adfd336d", 0x4}, {&(0x7f0000001e80)="c11c95c2eda11f95a09bb17ef200e71f2ef90e874438e8a1a05d961e45dcad5cf741ab00be514338417f1444b11645353482b36af3daf6dc52724ecfc4b2c9d395f32c317cc78d8feed0388f01fcc593a108e133ffcd3b91dc01884389cb8953e5b16c0f014ed16cc8d5c8f2", 0x6c}], 0x3, &(0x7f0000001f40)=[@cred={{0x1c, 0x1, 0x2, {r29, 0xee00, r30}}}], 0x20, 0x4000}, {&(0x7f0000001f80)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000021c0)=[{&(0x7f0000002000)="3d6fc7fdbb9d9820cab4181c8fdde6300c3bb27dd00eb7517c", 0x19}, {&(0x7f0000002040)="ab9f29371b6647ae37114172b350cc68410d2d06a0d34ef0545e80026aea50eecb3ad5790d4046279cdd49307e90a1706f75da4c8c139e793c93a3c1bbc5d2456a8ee819aba5c39757c45017afea32dcdf40114282ea28bb770301c15ee6c541cbbf061867e49868abf3d28c193ca2bc51c8a108b76bddc4ebea654c905910af4b7b84bc6138c3e0576377ec9479421fe19235c3ce2b795ca073edaf9c84f60439c0f4072d1af2fb7ef74e2ed6e671a5e045442bf2a6c21ae5f0a62bab26ba8074c137ba3089f7ef1723a1d82c976d13e7c91bbc8c5ee2795a8717849e1924ef1bf393bf25c3062009a6062d9e", 0xed}, {&(0x7f0000002140)="901f275779340fffb11e63c89bff8e8f5d7ba0c591d40c4fe8ebae357b897a598b7edcd90601620ed2320e11c693ee03d9e6c4d1696a8ab61f6447dcac5c911deb62358eb8b4d74b27385f2128c597da7fc38597902ead459eada1f4ecb6d84398bf403f49f645", 0x67}], 0x3, &(0x7f0000002380)=[@cred={{0x1c, 0x1, 0x2, {r31, r33, r34}}}, @cred={{0x1c, 0x1, 0x2, {r37, r38, r40}}}], 0x40, 0x4000000}], 0x4, 0x8000) [ 373.559783] FAT-fs (loop7): unable to read boot sector 19:18:29 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000001c0)=r2, 0x4) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000140)) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000180)) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socket$packet(0x11, 0x3, 0x300) ioctl$KDDELIO(r3, 0x4b35, 0x4) [ 373.654074] FAT-fs (loop1): unable to read boot sector [ 373.665091] FAT-fs (loop11): unable to read boot sector 19:18:29 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0xe0089ed00849c60a, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$selinux_load(r2, &(0x7f00000001c0)={0xf97cff8c, 0x8, 'SE Linux', "cd5a6e348c94bfad13c4503bea28862aa1afb4527801"}, 0x26) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:29 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x3, 0x472, [0x0, 0x200002c0, 0x200004e6, 0x20000702], 0x0, &(0x7f00000001c0), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{0x5, 0x40, 0xf2a73e6d0f081126, 'ip6_vti0\x00', 'rose0\x00', 'bond_slave_0\x00', 'nr0\x00', @local, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], @random="0fdcedade79e", [0x195f958e7beb188, 0x0, 0xff, 0xff, 0xff], 0x106, 0x17e, 0x1f6, [@physdev={'physdev\x00', 0x70, {{'team_slave_1\x00', {0xec72d18924531c65}, 'batadv0\x00', {}, 0x10, 0x3}}}], [@common=@NFLOG={'NFLOG\x00', 0x50, {{0x7, 0x1, 0x1, 0x1, 0x0, "cf1762ddb667f2733f31623b26a89493073f86f7d5d38c4a205ce2667181136314868148f0de2a4bd868c9447d1bdc1e0e3df85f049ff55a3ef78bf572387874"}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0xa9, 0x4, 0xc7, 0x0, 0x0, "bcca12bc11a766daedaf666a62ea1f3da7ca4fd30bba54789da32b1961941f9a8267c894fa154fdc9517c22c94ce8d3de6943ce0643505d1d2c71a68358d2883"}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x2, [{0x9, 0x8, 0x5d70, 'yam0\x00', 'ip6gre0\x00', 'bond_slave_0\x00', 'veth1_to_hsr\x00', @broadcast, [0x101], @remote, [0x0, 0x0, 0x0, 0x0, 0xff, 0x1fe], 0x6e, 0xe6, 0x11e, [], [@common=@nflog={'nflog\x00', 0x50, {{0x4, 0x8, 0x8, 0x0, 0x0, "d1eae4a458d7673798ca522241b7b22a7219a52bc8edae8412242694613019b33adc2dfc75d4df128bf46b44fc39c004e6189ebea0bdf94c0ffa2dbf6554a740"}}}], @common=@mark={'mark\x00', 0x10, {{0xffffffe0, 0xfffffffffffffffc}}}}, {0x9, 0x3, 0x201, 'lo\x00', 'sit0\x00', 'bcsf0\x00', 'syzkaller0\x00', @random="ce6a8541c40a", [0x1fe, 0x0, 0xff], @empty, [0x7f, 0xff, 0x0, 0xff, 0xff, 0xff], 0x9e, 0x9e, 0xce, [@state={'state\x00', 0x8, {{0x5}}}], [], @common=@AUDIT={'AUDIT\x00', 0x8, {{0x3}}}}]}, {0x0, '\x00', 0x3, 0xfffffffffffffffe}]}, 0x4ea) ptrace$setregs(0xf, 0x0, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000780)={&(0x7f0000000740)='./file0\x00', 0x0, 0x10}, 0x10) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:29 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r1, 0x0, 0x70bd26}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, r1, 0x20, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x800) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) write$P9_RREADLINK(r4, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(0x0, 0x0, &(0x7f00000003c0)="8c", 0x1, r6) add_key$user(&(0x7f0000001200)='user\x00', &(0x7f0000001240)={'syz', 0x3}, &(0x7f0000001280)="455c3c04f6d39f05d8530eabeebc967fdf604f25b73b258cb17392638e7a35a5b83f45f0f936bacf34f7701171570d9857cc6707972b630c010dfe955baacae7fbd0a55d520d546bf82a2d66d0051cc6e4158d734cf3cb5542e5a0938e53263fb46c3153", 0x64, r6) request_key(&(0x7f0000000280)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x1}, 0xfffffffffffffffe, r6) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000300)={r6, 0x67, 0x4c}, &(0x7f00000003c0)={'enc=', 'raw', ' hash=', {'sha384-ce\x00'}}, &(0x7f0000000540)="c5575a9bc8b3528e0857a04bed44cb50dfdeb1c0002658d97961b041bafb83c47f204a4ef4a8316e3c550184f335ad66d368c2afecc572560c001105cdf660617a666b02b95803223ef6ce62f87049f142391e13a1a3d3dd98fdf16510922c0d259d8408d895f7", &(0x7f00000005c0)="85c32dd47ea0d79a76a67c47d1a14f41edbc3b404d2dce41cc58bf5afed4375285ff113183e8b530c212c9de7899b5068b346c78c9061997632c3a7173843ec0843abd1914e7822fb3c63315") r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$BLKRAGET(r7, 0x1263, &(0x7f0000000080)) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:30 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 373.737076] FAT-fs (loop3): unable to read boot sector [ 373.763504] FAT-fs (loop9): unable to read boot sector [ 373.770837] FAT-fs (loop5): unable to read boot sector 19:18:30 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:30 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipmr_getroute={0x1c, 0x1a, 0xd01, 0x70bd2a, 0x25dfdbfe, {0x80, 0x0, 0x80, 0x0, 0xfd, 0x3, 0xc8, 0xcc2870a08f1f7952, 0x4c80}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) dup(r2) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:30 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x2c) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 373.850465] FAT-fs (loop7): unable to read boot sector [ 373.888862] FAT-fs (loop11): unable to read boot sector 19:18:30 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:30 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[@mss={0x2, 0x5}, @window={0x3, 0x140, 0x3}, @mss={0x2, 0x3d82}, @timestamp, @window={0x3, 0x4, 0x1f}], 0x5) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) write$P9_RREADLINK(r4, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r2, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 373.993051] FAT-fs (loop3): unable to read boot sector [ 374.008404] FAT-fs (loop9): unable to read boot sector [ 374.010980] FAT-fs (loop5): unable to read boot sector 19:18:30 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x24a) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 374.051972] FAT-fs (loop11): unable to read boot sector 19:18:30 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000600)='./file0\x00', 0x10) fcntl$setpipe(r1, 0x407, 0x78b) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) rt_sigaction(0x19, &(0x7f0000000240)={&(0x7f00000001c0)="660fc6291cc4e1405f9600396866f3a745cbc44141ea4187c42351697df40043d062003e640fbef4c4c2fd2582bb3d0c1e8f2a4812005a760000", {0x10000}, 0x8000008, &(0x7f0000000200)="3e44d3fef04100902d310000cf0fd7e03edfb5080000002ad3f2440f2cb7c3000000420f0d75758f2920955d004404fe"}, &(0x7f0000000440)={&(0x7f00000003c0)="c4c1272af1422113c423050b21a8c4414c159c251d080000400f0f70aaaec482152d09c4219ddd1e8f6978d63cefc421d35f46fcc4a221a9c7", {}, 0x0, &(0x7f0000000400)="0ff6d8363e66440f11d3670fa590d7000000f247a72e0f1955083e660f153ec4a2819b5b04c48116c2b22c7fb4bc0ac4c17e165800c402ed45910f000000"}, 0x8, &(0x7f0000000480)) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x81400004}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="000028bd7002fddbdf2506000000"], 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x40d11) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:30 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x28100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) getpeername(r0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x80) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000002c0)=0xc) r2 = getgid() lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f00000003c0)={{}, {0x1, 0x1}, [{0x2, 0x2, r1}], {0x4, 0x1}, [{0x8, 0x6, r2}, {0x8, 0x2, r3}, {0x8, 0x4, r4}], {0x10, 0xa}, {0x20, 0x4}}, 0x44, 0x1) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r5, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 374.130986] FAT-fs (loop1): unable to read boot sector [ 374.161162] FAT-fs (loop1): unable to read boot sector 19:18:30 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) epoll_create1(0x80000) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) socket$inet6(0xa, 0xa, 0x2) 19:18:30 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 374.225237] FAT-fs (loop9): unable to read boot sector 19:18:30 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="0e000071857229375093b80017010005002e1a987c7ee0c12122aa46b3bf91c7d337d526195c432120ce8fd78c2b9998f9b9e82eaf8780357363e18dc2120df5c6effe9731075eec83cb22b30da353391d9b3f47a2e083f000dbdeb8cf02260e97768bf2febdbe046bb804db3818d95dc86c3603d6339652081656d1ebcf5979261ed6da9a192acc2270c213c71480338bfac516190b66e27c96ec8ca9c9609eb01e64650b19796b99c3d8715e7a3f550f84ea0debb26d42929b3ee24316e96b29531633663f2a771e5111b93b69e9c524e14e49a6b9d4c5412ea8bcc23518956d677cbaa5d285"], 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) creat(&(0x7f0000000080)='./bus\x00', 0x84) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 374.316823] FAT-fs (loop3): unable to read boot sector [ 374.335521] FAT-fs (loop5): unable to read boot sector 19:18:30 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x24a) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:30 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000002c0)={0x0, @dev, @initdev}, &(0x7f0000000300)=0xc) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./bus\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xc1, 0x0, 0x40, "192150736776a7d279423debf49d93b8", "e972f2199617158e8a282a66d9b00ba6406d5aace8af0ff9339dafd16d0ff770e5f31f080340142c897851def3ee9f8c4189514eef760d1a35d1b392330b628f7e82a742993a1c079c1485db8f1eac9a8ba421be58e087e7af6393b9a44750518aa672089c994266257cbb7ccb0353ce5dd481230420a142441b5f00d8b21a4188dbc16dfce141d463147c156beb99dccf3017c405c3d3680ae95d69fb5ef27f3906b12cc24862c9971da8ca"}, 0xc1, 0x1) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 374.370175] FAT-fs (loop11): unable to read boot sector [ 374.389074] FAT-fs (loop1): unable to read boot sector 19:18:30 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RFSYNC(r2, &(0x7f0000000200)={0x7, 0x33, 0x2}, 0x7) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(0xffffffffffffffff, &(0x7f00000001c0)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:30 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 374.442718] FAT-fs (loop7): unable to read boot sector [ 374.448970] FAT-fs (loop9): unable to read boot sector [ 374.504568] FAT-fs (loop7): unable to read boot sector 19:18:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_buf(r1, 0x1, 0x37, 0x0, &(0x7f0000000180)) dup(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept$unix(r5, 0x0, &(0x7f0000000240)) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x55) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, 0x0, 0xfffffffffffffe37) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x202, 0x0, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) mount(&(0x7f00000003c0)=ANY=[@ANYRES32=r10, @ANYRESDEC=r3, @ANYRESOCT=r9], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x80a0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r11 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r11, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) 19:18:30 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x1, 0x2, 0x4, 0x4, 0x0, 0xd87e, 0x90200, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9f2, 0x1, @perf_bp={&(0x7f00000001c0)}, 0x3080, 0xa8, 0x4, 0x7, 0x1, 0x401, 0x2}, r2, 0x7, 0xffffffffffffffff, 0x8) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r3, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 374.633277] FAT-fs (loop11): unable to read boot sector [ 374.661717] FAT-fs (loop11): unable to read boot sector [ 374.671741] FAT-fs (loop1): unable to read boot sector 19:18:30 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x24a) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) prctl$PR_SET_THP_DISABLE(0x29, 0x1) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) 19:18:30 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x80, 0xfffffffffffffffd}, 0x0, 0x4, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$UHID_DESTROY(r2, &(0x7f0000000180), 0x4) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x1f, 0xc2a}, 0x18) 19:18:30 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)=0x7, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) 19:18:30 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) r0 = socket(0x10, 0x3, 0x0) sendmmsg$inet6(r0, &(0x7f000000c600)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000003c0)="52c8e1d39da41ebf4d563e2c7be2e186", 0x10}], 0x1, &(0x7f0000000640)=[@rthdrdstopts={{0x18}}], 0x18}}, {{&(0x7f00000006c0)={0xa, 0x0, 0x0, @remote}, 0x9, 0x0}}], 0x2, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) [ 374.740256] FAT-fs (loop9): unable to read boot sector [ 374.778138] FAT-fs (loop11): unable to read boot sector 19:18:31 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) write$P9_RREADLINK(r2, &(0x7f0000000140)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) ioctl(r4, 0x200000, &(0x7f0000000180)="384ed68f35d13963746f675a95ecea0a41a373df16a5b162b4a561b3b642e2b2ba757d75ef4023d262640600c080045cab928954de88dbb7067f35e7a752e0772ea980859e9edcb6067aaa44ff4729393a9de9194e1edcbef6147c7c69a445087d7d518c48fa711132c01fa51340348fe647d882ed5c6aff97e8122eb5daa59da5c42ae2a577e1b1c5349ba8348669616d0c6b2612820199fc8ab77c3aad71940e8377940b1d") ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000014c0)={'vet\x00\x00\x96T\x00\x00\x00\x00\x00\xbdh \x00', 0x407}) ioctl$TUNGETSNDBUF(r3, 0x800454d3, &(0x7f0000000080)) 19:18:31 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = accept4(r2, 0x0, &(0x7f00000001c0), 0x0) write$binfmt_script(r3, &(0x7f00000003c0)={'#! ', './file0', [{0x20, 'vmnet1nodev#cpuseteth0md5sumcpusetsystem'}, {0x20, 'msdos\x00'}, {0x20, 'posix_acl_accesswlan1$%proc\xdfselinuxuserbdev'}, {0x20, '.posix_acl_access[mime_type\xfd'}, {0x20, 'mime_typesystem'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}, {0x20, 'msdos\x00'}], 0xa, "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"}, 0x1a6) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) 19:18:31 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x0, 0x70bd26}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0xe52b70ef39e298d6, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x24012044) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setflags(r4, 0x2, 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)=""/91, 0x5b}], 0x1, &(0x7f00000003c0)}, 0x2}, {{&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000a80)=""/4096, 0x1000}], 0x1}, 0x5}], 0x2, 0x40000000, &(0x7f0000000600)={0x77359400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000002140)={@empty, @remote, 0x0}, &(0x7f0000002180)=0xc) bind$packet(r5, &(0x7f00000021c0)={0x11, 0x11, r8, 0x1, 0x7f, 0x6, @local}, 0x14) [ 374.957651] print_req_error: 74 callbacks suppressed [ 374.957657] print_req_error: I/O error, dev loop5, sector 0 [ 374.969096] FAT-fs (loop5): unable to read boot sector [ 374.990799] print_req_error: I/O error, dev loop11, sector 0 [ 374.999565] FAT-fs (loop11): unable to read boot sector 19:18:31 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="17d35da9a29e81b9d8f7d8e7c355414a34b7d4cfb02f74c050d2c98e778817183f0e7abcb17f", 0x26}, {&(0x7f0000000140)="f00261dfdf773ee1211bceaa3a99ede84e351d3c26335159577a88a48e3fb394f7ecdae57f98b1b5efb1e15a1b46de7553eb59eba419743081be8429ed4bf69622fc57c28fc66c04101382104e839a1ef50cfcb9b272ee42f9b1cd77e9174545e6f83e775fb686b4b43ab65ad95eabc9305b5d0d77ec764d0e8f6c0f44ee6aacae842d23056b3339be69f829f95a4a47446250d2f6b11fe37d53fecd51432c45ef64eb31b15bf291a8e8ad57a5a4f230eb88b9692b", 0xb5}], 0x2, &(0x7f00000002c0)=[{0xd8, 0x113, 0x5, "da789215afea693ec68c02b7d155ce7eb9a0bb8f3875b95e217ca9130465fac889e3c1586e209fe1b415bbe5ef21bf31b331921be924d9107426dc4b605f653139700029b0317963c792c820b20d252fc9df9c39cd5e759d0bff026f31fe018bc2e452edd80391051ca394cdafd4500358289bec0bc4b73f67d9caf6f39d03aa37e6b9490321b2fc3f9d9763f0909e37b75cffed09f808d3119cf2e550a9154a5e084a48593c32f54508d955b429c6fb5b360f0b2d401500cc4fcad0d085fdfd480019b15de5"}], 0xd8}, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) [ 375.011728] print_req_error: I/O error, dev loop1, sector 0 [ 375.018288] FAT-fs (loop1): unable to read boot sector 19:18:31 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) open(&(0x7f0000000200)='./file0\x00', 0x406880, 0x4) preadv(r1, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f00000001c0)={0x7, 0x33, 0x2}, 0x7) write$input_event(r1, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 375.059838] print_req_error: I/O error, dev loop9, sector 0 [ 375.068678] FAT-fs (loop9): unable to read boot sector 19:18:31 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 375.146418] selinux_nlmsg_perm: 20 callbacks suppressed [ 375.146427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=42141 sclass=netlink_route_socket pig=22129 comm=syz-executor.3 19:18:31 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0xc008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xb, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10e, 0xa, &(0x7f0000000080)=0x8, 0x4) 19:18:31 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) write$P9_RREADLINK(r3, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) ftruncate(r1, 0x6) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x0, 0xc2a}, 0x18) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000380)=0x9) [ 375.191956] print_req_error: I/O error, dev loop1, sector 0 [ 375.199598] FAT-fs (loop1): unable to read boot sector [ 375.204963] print_req_error: I/O error, dev loop7, sector 0 [ 375.212076] FAT-fs (loop7): unable to read boot sector 19:18:31 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r2, 0x0, 0x70bd26}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0xe52b70ef39e298d6, 0x70bd25, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x24012044) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setflags(r4, 0x2, 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) write$input_event(r3, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) ptrace$setregs(0xf, 0x0, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x0, 0x45, @local, 0x6408d806}, 0x1c) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000580)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)=""/91, 0x5b}], 0x1, &(0x7f00000003c0)}, 0x2}, {{&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000a80)=""/4096, 0x1000}], 0x1}, 0x5}], 0x2, 0x40000000, &(0x7f0000000600)={0x77359400}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_mreqn(r7, 0x0, 0x24, &(0x7f0000002140)={@empty, @remote, 0x0}, &(0x7f0000002180)=0xc) bind$packet(r5, &(0x7f00000021c0)={0x11, 0x11, r8, 0x1, 0x7f, 0x6, @local}, 0x14) [ 375.297127] print_req_error: I/O error, dev loop9, sector 0 [ 375.303769] FAT-fs (loop9): unable to read boot sector [ 375.329546] print_req_error: I/O error, dev loop11, sector 0 [ 375.335585] FAT-fs (loop11): unable to read boot sector 19:18:31 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGETD(r2, 0x5424, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_misc(r5, &(0x7f0000000140)=ANY=[], 0x101ce) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DAEMON(r8, &(0x7f0000000180)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x180286628}, 0x312, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r6, 0x0, 0x70bd29, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x400c050}, 0x1000) sendmsg$IPVS_CMD_GET_SERVICE(r4, &(0x7f0000000bc0)={&(0x7f0000000b40)={0x10, 0x0, 0x0, 0x100204}, 0xc, &(0x7f0000000b80)={&(0x7f0000000d80)={0xf8, r6, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x52}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x8}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x20}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x44}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x18, 0x2}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x24}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="23998a694dcfbbb855fc1ff46dfbc7ae"}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0xf8}, 0x1, 0x0, 0x0, 0x4000005}, 0x4000) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x208c1818}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x3c, r6, 0x301, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1b9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2b34}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ptrace$setregs(0xf, 0x0, 0xf09, &(0x7f0000000080)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/49, 0x31, 0x1, &(0x7f0000000180)={0xa, 0x4e24, 0x45, @local, 0x6408d806}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCPKT(r10, 0x5420, &(0x7f0000000240)=0xfffffff7) 19:18:31 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000080)=0xffffffffffffff39) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x28, 0x0, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000300)=""/112) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREADLINK(r2, &(0x7f00000001c0)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) preadv(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) write$input_event(r0, &(0x7f0000000280)={{0x0, 0x7530}, 0x2, 0xc2a}, 0x18) r3 = getpgid(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0x7, &(0x7f0000000240)={0x0, 0x7, 0x7, 0x1}, 0x10) ptrace$setregs(0xf, r3, 0xf09, &(0x7f0000000080)) syz_open_procfs(0x0, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000380)=0x9) [ 375.390444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=42141 sclass=netlink_route_socket pig=22114 comm=syz-executor.3 [ 375.406142] print_req_error: I/O error, dev loop7, sector 0 [ 375.412472] FAT-fs (loop7): unable to read boot sector [ 375.484492] print_req_error: I/O error, dev loop11, sector 0 [ 375.490527] FAT-fs (loop1): unable to read boot sector [ 375.494532] FAT-fs (loop11): unable to read boot sector [ 375.557434] FAT-fs (loop5): unable to read boot sector [ 375.587800] FAT-fs (loop11): unable to read boot sector INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes [ 571.361124] INFO: task syz-executor.4:3101 blocked for more than 140 seconds. [ 571.368443] Not tainted 4.14.151+ #0 [ 571.373159] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 571.381171] syz-executor.4 D25312 3101 3100 0x00000000 [ 571.386811] Call Trace: [ 571.389406] ? __schedule+0x88c/0x1f80 [ 571.397144] ? rwsem_optimistic_spin+0x1b4/0x400 [ 571.401957] ? __sched_text_start+0x8/0x8 [ 571.406105] ? mark_held_locks+0xa6/0xf0 [ 571.410503] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 571.415431] schedule+0x92/0x1c0 [ 571.418794] rwsem_down_write_failed+0x3ee/0x7c0 [ 571.423883] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 571.429505] ? perf_trace_lock_acquire+0x122/0x4e0 [ 571.434742] ? HARDIRQ_verbose+0x10/0x10 [ 571.438812] ? fs_reclaim_acquire+0x10/0x10 [ 571.443448] call_rwsem_down_write_failed+0x13/0x20 [ 571.448472] down_write+0x4f/0x90 [ 571.452219] ? copy_process.part.0+0x246a/0x66c0 [ 571.456972] copy_process.part.0+0x246a/0x66c0 [ 571.461887] ? __cleanup_sighand+0x50/0x50 [ 571.466120] ? lock_acquire+0x12b/0x360 [ 571.470370] ? __might_fault+0xd4/0x1b0 [ 571.474357] _do_fork+0x197/0xce0 [ 571.477812] ? fork_idle+0x260/0x260 [ 571.481824] ? SyS_clock_gettime+0x7d/0xe0 [ 571.486401] ? do_clock_gettime+0xd0/0xd0 [ 571.490848] ? do_syscall_64+0x43/0x520 [ 571.494902] ? sys_vfork+0x20/0x20 [ 571.498458] do_syscall_64+0x19b/0x520 [ 571.502694] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.507881] RIP: 0033:0x45851a [ 571.511790] RSP: 002b:00007ffce991f710 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 571.519500] RAX: ffffffffffffffda RBX: 00007ffce991f710 RCX: 000000000045851a [ 571.527088] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 571.534387] RBP: 00007ffce991f750 R08: 0000000000000001 R09: 000000000262c940 [ 571.542816] R10: 000000000262cc10 R11: 0000000000000246 R12: 0000000000000001 [ 571.550111] R13: 0000000000000000 R14: 0000000000000000 R15: 00007ffce991f7a0 [ 571.558053] INFO: task syz-executor.3:22114 blocked for more than 140 seconds. [ 571.565928] Not tainted 4.14.151+ #0 [ 571.570200] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 571.578175] syz-executor.3 D27792 22114 1859 0x80000002 [ 571.584122] Call Trace: [ 571.586715] ? __schedule+0x88c/0x1f80 [ 571.590860] ? rwsem_optimistic_spin+0x1b4/0x400 [ 571.595622] ? __sched_text_start+0x8/0x8 [ 571.599772] ? mark_held_locks+0xa6/0xf0 [ 571.604921] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 571.609848] schedule+0x92/0x1c0 [ 571.613499] rwsem_down_write_failed+0x3ee/0x7c0 [ 571.618266] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 571.624543] ? perf_trace_lock_acquire+0x122/0x4e0 [ 571.629485] ? HARDIRQ_verbose+0x10/0x10 [ 571.633896] ? trace_hardirqs_on_caller+0x37b/0x540 [ 571.638914] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 571.643964] call_rwsem_down_write_failed+0x13/0x20 [ 571.648990] down_write+0x4f/0x90 [ 571.653445] ? unlink_file_vma+0x6e/0xa0 [ 571.657508] unlink_file_vma+0x6e/0xa0 [ 571.661662] free_pgtables+0xb3/0x1c0 [ 571.665471] exit_mmap+0x222/0x440 [ 571.669007] ? SyS_munmap+0x30/0x30 [ 571.672918] ? exit_aio+0x264/0x340 [ 571.676545] ? reacquire_held_locks+0xb5/0x3f0 [ 571.681431] mmput+0xeb/0x370 [ 571.684542] do_exit+0x905/0x2a20 [ 571.687999] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 571.693036] ? mm_update_next_owner+0x610/0x610 [ 571.697721] ? retint_kernel+0x2d/0x2d [ 571.701877] do_group_exit+0x100/0x2e0 [ 571.705768] get_signal+0x39f/0x1cc0 [ 571.709486] ? kick_process+0xef/0x180 [ 571.713656] do_signal+0x96/0x15d0 [ 571.717202] ? __sys_sendmmsg+0x25b/0x360 [ 571.721613] ? SyS_sendmsg+0x40/0x40 [ 571.725322] ? __might_fault+0x104/0x1b0 [ 571.729381] ? setup_sigcontext+0x810/0x810 [ 571.733961] ? lock_acquire+0x12b/0x360 [ 571.737953] ? retint_kernel+0x2d/0x2d [ 571.742161] ? trace_hardirqs_on_caller+0x37b/0x540 [ 571.747178] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 571.752384] ? retint_kernel+0x2d/0x2d [ 571.756287] ? exit_to_usermode_loop+0xcd/0x160 [ 571.761254] exit_to_usermode_loop+0x11d/0x160 [ 571.765851] do_syscall_64+0x3a3/0x520 [ 571.769748] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 571.775248] RIP: 0033:0x459f49 [ 571.778437] RSP: 002b:00007f9a4faabc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 571.786450] RAX: 0000000000000001 RBX: 0000000000000004 RCX: 0000000000459f49 [ 571.793752] RDX: 0000000000000002 RSI: 000000002000c600 RDI: 0000000000000004 [ 571.802338] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 571.810597] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9a4faac6d4 [ 571.817862] R13: 00000000004c7ca9 R14: 00000000004de0c8 R15: 00000000ffffffff [ 571.825506] INFO: task syz-executor.3:22130 blocked for more than 140 seconds. [ 571.832896] Not tainted 4.14.151+ #0 [ 571.837117] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 571.845388] syz-executor.3 D27840 22130 1859 0x80000004 [ 571.851054] Call Trace: [ 571.853647] ? __schedule+0x88c/0x1f80 [ 571.857526] ? ___preempt_schedule+0x16/0x18 [ 571.863306] ? __sched_text_start+0x8/0x8 [ 571.867464] ? mark_held_locks+0xa6/0xf0 [ 571.871825] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 571.876754] schedule+0x92/0x1c0 [ 571.880405] rwsem_down_write_failed+0x3ee/0x7c0 [ 571.885170] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 571.891061] ? perf_trace_lock_acquire+0x122/0x4e0 [ 571.896002] ? HARDIRQ_verbose+0x10/0x10 [ 571.900356] call_rwsem_down_write_failed+0x13/0x20 [ 571.905381] down_write+0x4f/0x90 [ 571.908827] ? unlink_file_vma+0x6e/0xa0 [ 571.913181] unlink_file_vma+0x6e/0xa0 [ 571.917070] free_pgtables+0xb3/0x1c0 [ 571.921162] exit_mmap+0x222/0x440 [ 571.924701] ? SyS_munmap+0x30/0x30 [ 571.928326] ? exit_aio+0x264/0x340 [ 571.932244] ? reacquire_held_locks+0xb5/0x3f0 [ 571.936864] mmput+0xeb/0x370 [ 571.939967] do_exit+0x905/0x2a20 [ 571.943740] ? HARDIRQ_verbose+0x10/0x10 [ 571.947804] ? mm_update_next_owner+0x610/0x610 [ 571.952799] ? get_signal+0x334/0x1cc0 [ 571.956688] ? lock_downgrade+0x630/0x630 [ 571.961090] ? lock_acquire+0x12b/0x360 [ 571.965058] ? get_signal+0x1e7/0x1cc0 [ 571.968949] do_group_exit+0x100/0x2e0 [ 571.973132] get_signal+0x39f/0x1cc0 [ 571.976856] ? perf_trace_lock_acquire+0x122/0x4e0 [ 571.982125] do_signal+0x96/0x15d0 [ 571.986371] ? __might_fault+0x104/0x1b0 [ 571.990687] ? setup_sigcontext+0x810/0x810 [ 571.995005] ? lock_acquire+0x12b/0x360 [ 571.998973] ? __might_fault+0xd4/0x1b0 [ 572.003249] ? _copy_to_user+0x82/0xd0 [ 572.007153] ? SyS_futex+0x1c5/0x2c3 [ 572.011197] ? SyS_futex+0x1cf/0x2c3 [ 572.014921] ? do_futex+0x1980/0x1980 [ 572.018721] ? exit_to_usermode_loop+0xcd/0x160 [ 572.023708] exit_to_usermode_loop+0x11d/0x160 [ 572.028294] do_syscall_64+0x3a3/0x520 [ 572.032467] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.037654] RIP: 0033:0x459f49 [ 572.041125] RSP: 002b:00007f9a4faabcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 572.048835] RAX: fffffffffffffe00 RBX: 000000000075bf28 RCX: 0000000000459f49 [ 572.056439] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf28 [ 572.063738] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 572.071389] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf2c [ 572.078656] R13: 00007ffdbb1945ff R14: 00007f9a4faac9c0 R15: 000000000075bf2c [ 572.086311] INFO: task syz-executor.3:22147 blocked for more than 140 seconds. [ 572.093711] Not tainted 4.14.151+ #0 [ 572.097936] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 572.106261] syz-executor.3 D28912 22147 1859 0x80000004 [ 572.111922] Call Trace: [ 572.114521] ? __schedule+0x88c/0x1f80 [ 572.118407] ? ___preempt_schedule+0x16/0x18 [ 572.124108] ? __sched_text_start+0x8/0x8 [ 572.128268] ? mark_held_locks+0xa6/0xf0 [ 572.132679] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 572.137605] schedule+0x92/0x1c0 [ 572.141242] rwsem_down_write_failed+0x3ee/0x7c0 [ 572.146094] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 572.151980] ? perf_trace_lock_acquire+0x122/0x4e0 [ 572.156912] ? HARDIRQ_verbose+0x10/0x10 [ 572.161256] call_rwsem_down_write_failed+0x13/0x20 [ 572.166279] down_write+0x4f/0x90 [ 572.169722] ? unlink_file_vma+0x6e/0xa0 [ 572.174075] unlink_file_vma+0x6e/0xa0 [ 572.177959] free_pgtables+0xb3/0x1c0 [ 572.182010] exit_mmap+0x222/0x440 [ 572.185562] ? SyS_munmap+0x30/0x30 [ 572.189184] ? exit_aio+0x264/0x340 [ 572.193067] ? reacquire_held_locks+0xb5/0x3f0 [ 572.197687] mmput+0xeb/0x370 [ 572.201063] do_exit+0x905/0x2a20 [ 572.204529] ? HARDIRQ_verbose+0x10/0x10 [ 572.208721] ? mm_update_next_owner+0x610/0x610 [ 572.213834] ? get_signal+0x334/0x1cc0 [ 572.217734] ? lock_downgrade+0x630/0x630 [ 572.222592] ? lock_acquire+0x12b/0x360 [ 572.226572] ? get_signal+0x1e7/0x1cc0 [ 572.230748] do_group_exit+0x100/0x2e0 [ 572.234645] get_signal+0x39f/0x1cc0 [ 572.238367] ? finish_mkwrite_fault+0x4e0/0x4e0 [ 572.243361] ? __handle_mm_fault+0x821/0x2700 [ 572.247865] do_signal+0x96/0x15d0 [ 572.251661] ? __handle_mm_fault+0x6e4/0x2700 [ 572.256159] ? perf_trace_lock_acquire+0x122/0x4e0 [ 572.261352] ? setup_sigcontext+0x810/0x810 [ 572.265844] ? HARDIRQ_verbose+0x10/0x10 [ 572.269898] ? HARDIRQ_verbose+0x10/0x10 [ 572.274262] ? __do_page_fault+0x49f/0xbb0 [ 572.278501] ? SyS_futex+0x1c5/0x2c3 [ 572.282470] ? SyS_futex+0x1cf/0x2c3 [ 572.286188] ? do_futex+0x1980/0x1980 [ 572.290270] ? exit_to_usermode_loop+0xcd/0x160 [ 572.294945] exit_to_usermode_loop+0x11d/0x160 [ 572.299526] do_syscall_64+0x3a3/0x520 [ 572.303787] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.308985] RIP: 0033:0x459f49 [ 572.312451] RSP: 002b:00007f9a4fa8acf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 572.320209] RAX: fffffffffffffe00 RBX: 000000000075bfd0 RCX: 0000000000459f49 [ 572.327490] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bfd0 [ 572.335348] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 572.342748] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bfd4 [ 572.350337] R13: 00007ffdbb1945ff R14: 00007f9a4fa8b9c0 R15: 000000000075bfd4 [ 572.357643] INFO: task syz-executor.2:22165 blocked for more than 140 seconds. [ 572.365309] Not tainted 4.14.151+ #0 [ 572.369543] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 572.378434] syz-executor.2 D27760 22165 4822 0x80000000 [ 572.384129] Call Trace: [ 572.386724] ? __schedule+0x88c/0x1f80 [ 572.390916] ? rwsem_optimistic_spin+0x1b4/0x400 [ 572.395689] ? __sched_text_start+0x8/0x8 [ 572.399839] ? mark_held_locks+0xa6/0xf0 [ 572.404188] ? rwsem_down_write_failed+0x3e9/0x7c0 [ 572.409131] schedule+0x92/0x1c0 [ 572.412787] rwsem_down_write_failed+0x3ee/0x7c0 [ 572.417555] ? rwsem_down_read_failed_killable+0x5c0/0x5c0 [ 572.423467] ? perf_trace_lock_acquire+0x122/0x4e0 [ 572.428402] ? HARDIRQ_verbose+0x10/0x10 [ 572.432960] call_rwsem_down_write_failed+0x13/0x20 [ 572.437993] down_write+0x4f/0x90 [ 572.442040] ? unlink_file_vma+0x6e/0xa0 [ 572.446106] unlink_file_vma+0x6e/0xa0 [ 572.449993] free_pgtables+0xb3/0x1c0 [ 572.454197] exit_mmap+0x222/0x440 [ 572.457740] ? SyS_munmap+0x30/0x30 [ 572.461912] ? exit_aio+0x264/0x340 [ 572.465540] ? reacquire_held_locks+0xb5/0x3f0 [ 572.470426] mmput+0xeb/0x370 [ 572.473551] do_exit+0x905/0x2a20 [ 572.477012] ? mm_update_next_owner+0x610/0x610 [ 572.481963] ? __bad_area_nosemaphore+0x193/0x280 [ 572.486802] ? up_read+0x17/0x30 [ 572.490425] do_group_exit+0x100/0x2e0 [ 572.494316] SyS_exit_group+0x19/0x20 [ 572.498119] ? do_group_exit+0x2e0/0x2e0 [ 572.502473] do_syscall_64+0x19b/0x520 [ 572.506367] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.511811] RIP: 0033:0x459f49 [ 572.514997] RSP: 002b:00007f7941ae8408 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 572.522963] RAX: ffffffffffffffda RBX: 000000000000000b RCX: 0000000000459f49 [ 572.530268] RDX: 0000000000413c01 RSI: 00007f7941ae8440 RDI: 000000000000000b [ 572.537534] RBP: 0000000000000007 R08: 0000000000000000 R09: 0000000000000000 [ 572.545649] R10: 000000000000000b R11: 0000000000000246 R12: 00007f7941ae8a40 [ 572.552951] R13: 00000000004d1bb8 R14: 00000000004e1260 R15: 00000000ffffffff [ 572.560684] [ 572.560684] Showing all locks held in the system: [ 572.567013] 1 lock held by khungtaskd/23: [ 572.571294] #0: (tasklist_lock){.+.+}, at: [<00000000af53f495>] debug_show_all_locks+0x7c/0x21a [ 572.580356] 2 locks held by getty/1766: [ 572.584320] #0: (&tty->ldisc_sem){++++}, at: [<000000007b98f398>] tty_ldisc_ref_wait+0x22/0x80 [ 572.593290] #1: (&ldata->atomic_read_lock){+.+.}, at: [<0000000027fc6f20>] n_tty_read+0x1f7/0x1700 [ 572.603653] 1 lock held by syz-executor.3/1846: [ 572.608480] #0: (&mapping->i_mmap_rwsem){++++}, at: [<00000000a53eab88>] unlink_file_vma+0x6e/0xa0 [ 572.617794] 1 lock held by syz-executor.4/3100: [ 572.622480] #0: (&mapping->i_mmap_rwsem){++++}, at: [<00000000a53eab88>] unlink_file_vma+0x6e/0xa0 [ 572.632149] 4 locks held by syz-executor.4/3101: [ 572.636887] #0: (&dup_mmap_sem){.+.+}, at: [<00000000902f30b9>] copy_process.part.0+0x1ff5/0x66c0 [ 572.646109] #1: (&mm->mmap_sem){++++}, at: [<000000002e5aad5c>] copy_process.part.0+0x2011/0x66c0 [ 572.655348] #2: (&mm->mmap_sem/1){+.+.}, at: [<000000008045f1cd>] copy_process.part.0+0x204c/0x66c0 [ 572.664754] #3: (&mapping->i_mmap_rwsem){++++}, at: [<0000000092fde278>] copy_process.part.0+0x246a/0x66c0 [ 572.674765] 1 lock held by syz-executor.1/6372: [ 572.679421] #0: (&mapping->i_mmap_rwsem){++++}, at: [<00000000a53eab88>] unlink_file_vma+0x6e/0xa0 [ 572.688972] 1 lock held by syz-executor.3/22114: [ 572.693762] #0: (&mapping->i_mmap_rwsem){++++}, at: [<00000000a53eab88>] unlink_file_vma+0x6e/0xa0 [ 572.703187] 1 lock held by syz-executor.3/22130: [ 572.707944] #0: (&mapping->i_mmap_rwsem){++++}, at: [<00000000a53eab88>] unlink_file_vma+0x6e/0xa0 [ 572.717284] 1 lock held by syz-executor.3/22147: [ 572.722060] #0: (&mapping->i_mmap_rwsem){++++}, at: [<00000000a53eab88>] unlink_file_vma+0x6e/0xa0 [ 572.731412] 1 lock held by syz-executor.2/22165: [ 572.736195] #0: (&mapping->i_mmap_rwsem){++++}, at: [<00000000a53eab88>] unlink_file_vma+0x6e/0xa0 [ 572.745539] [ 572.747853] ============================================= [ 572.747853] [ 572.755407] NMI backtrace for cpu 1 [ 572.759046] CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.151+ #0 [ 572.765525] Call Trace: [ 572.768108] dump_stack+0xca/0x134 [ 572.772338] ? irq_force_complete_move.cold+0x2c/0x7b [ 572.777520] nmi_cpu_backtrace.cold+0x47/0x86 [ 572.782011] ? irq_force_complete_move.cold+0x7b/0x7b [ 572.787200] nmi_trigger_cpumask_backtrace+0x119/0x147 [ 572.792486] watchdog+0x629/0xbe0 [ 572.795938] ? reset_hung_task_detector+0x30/0x30 [ 572.800778] kthread+0x31f/0x430 [ 572.804155] ? kthread_create_on_node+0xf0/0xf0 [ 572.808822] ret_from_fork+0x3a/0x50 [ 572.812636] Sending NMI from CPU 1 to CPUs 0: [ 572.817679] NMI backtrace for cpu 0 [ 572.817683] CPU: 0 PID: 22153 Comm: syz-executor.1 Not tainted 4.14.151+ #0 [ 572.817686] task: 0000000066c16192 task.stack: 00000000d789bd0a [ 572.817688] RIP: 0010:debug_lockdep_rcu_enabled.part.0+0x33/0x50 [ 572.817690] RSP: 0018:ffff8881dba07b58 EFLAGS: 00000002 [ 572.817695] RAX: 0000000000000007 RBX: ffff888191f29780 RCX: 1ffffffff0942c80 [ 572.817698] RDX: 0000000000000000 RSI: 1ffffffff08d5684 RDI: ffff888191f29fac [ 572.817701] RBP: ffffffff848e3508 R08: 0000000000000002 R09: 0000000000000001 [ 572.817704] R10: 0000000000000000 R11: ffffffff84c300ab R12: 0000000000000000 [ 572.817706] R13: 0000000000000000 R14: 0000000000000002 R15: 0000000000000000 [ 572.817709] FS: 00007f8c66173700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 572.817712] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 572.817714] CR2: 0000000002279000 CR3: 000000019e852005 CR4: 00000000001606b0 [ 572.817717] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 572.817720] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 572.817721] Call Trace: [ 572.817723] [ 572.817725] lock_acquire+0x197/0x360 [ 572.817727] ktime_get+0x68/0x1b0 [ 572.817729] ? perf_swevent_hrtimer+0x2d6/0x390 [ 572.817731] perf_swevent_hrtimer+0x2d6/0x390 [ 572.817733] ? __perf_event_overflow+0x340/0x340 [ 572.817735] ? debug_object_deactivate+0x1e4/0x360 [ 572.817737] ? lock_downgrade+0x630/0x630 [ 572.817739] ? lock_acquire+0x12b/0x360 [ 572.817742] ? debug_object_deactivate+0x104/0x360 [ 572.817744] ? _raw_spin_unlock_irqrestore+0x41/0x70 [ 572.817746] ? debug_object_deactivate+0x1e4/0x360 [ 572.817748] ? __hrtimer_run_queues+0x227/0xc40 [ 572.817750] ? lock_downgrade+0x630/0x630 [ 572.817753] ? check_preemption_disabled+0x35/0x1f0 [ 572.817755] ? __perf_event_overflow+0x340/0x340 [ 572.817757] __hrtimer_run_queues+0x28b/0xc40 [ 572.817759] ? hrtimer_start_range_ns+0x1090/0x1090 [ 572.817762] ? ktime_get_update_offsets_now+0x207/0x2f0 [ 572.817764] hrtimer_interrupt+0x1bd/0x490 [ 572.817766] smp_apic_timer_interrupt+0x147/0x650 [ 572.817768] apic_timer_interrupt+0x8c/0xa0 [ 572.817770] [ 572.817772] RIP: 0010:unmap_page_range+0x86a/0x1320 [ 572.817774] RSP: 0018:ffff888174faf940 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff10 [ 572.817779] RAX: 1ffff1102e9f5f6a RBX: 0000000000000000 RCX: ffff888174fafb38 [ 572.817782] RDX: ffffffff814d7f2a RSI: ffffc90008f86000 RDI: ffff888174fafb50 [ 572.817784] RBP: 00007eff1ea24000 R08: 0000000000000001 R09: ffffed1031dc7825 [ 572.817787] R10: ffffed1031dc7824 R11: ffff88818ee3c127 R12: 00007eff1ea25000 [ 572.817790] R13: ffffea000726a9c0 R14: dffffc0000000000 R15: ffff88818ee3c120 [ 572.817792] ? _vm_normal_page+0x2f0/0x2f0 [ 572.817796] ? lru_add_drain_cpu+0x18e/0x3d0 [ 572.817799] ? lru_cache_add_active_or_unevictable+0x210/0x210 [ 572.817801] unmap_single_vma+0x118/0x170 [ 572.817803] zap_page_range_single+0x206/0x2a0 [ 572.817805] ? unmap_single_vma+0x170/0x170 [ 572.817808] ? vma_interval_tree_subtree_search+0x12d/0x1a0 [ 572.817810] ? vma_interval_tree_iter_next+0xd8/0x1e0 [ 572.817812] unmap_mapping_range+0x212/0x290 [ 572.817814] ? zap_vma_ptes+0xd0/0xd0 [ 572.817816] ? timespec_trunc+0xc9/0x140 [ 572.817818] ? put_itimerspec64+0x1c0/0x1c0 [ 572.817820] truncate_pagecache+0x51/0x90 [ 572.817822] simple_setattr+0xc6/0xf0 [ 572.817824] notify_change2+0xbea/0xd80 [ 572.817826] do_truncate2+0x11e/0x1e0 [ 572.817827] ? finish_open+0x170/0x170 [ 572.817830] ? __lock_acquire+0x26eb/0x4320 [ 572.817832] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 572.817834] ? rcu_read_lock_sched_held+0x10a/0x130 [ 572.817837] do_sys_ftruncate.constprop.0+0x34f/0x4a0 [ 572.817839] ? do_syscall_64+0x43/0x520 [ 572.817841] ? compat_SyS_truncate+0x40/0x40 [ 572.817843] do_syscall_64+0x19b/0x520 [ 572.817845] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 572.817847] RIP: 0033:0x459f49 [ 572.817849] RSP: 002b:00007f8c66172c78 EFLAGS: 00000246 ORIG_RAX: 000000000000004d [ 572.817853] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000459f49 [ 572.817856] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 572.817859] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 572.817862] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8c661736d4 [ 572.817864] R13: 00000000004c0b83 R14: 00000000004d3928 R15: 00000000ffffffff [ 572.817866] Code: ff df 53 65 48 8b 1c 25 c0 de 01 00 48 8d bb 2c 08 00 00 48 89 fa 48 c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 04 <84> d2 75 0f 8b 93 2c 08 00 00 31 c0 5b 85 d2 0f 94 c0 c3 e8 95 [ 572.818539] Kernel panic - not syncing: hung_task: blocked tasks [ 573.260870] CPU: 1 PID: 23 Comm: khungtaskd Not tainted 4.14.151+ #0 [ 573.267365] Call Trace: [ 573.269961] dump_stack+0xca/0x134 [ 573.273499] panic+0x1f1/0x3da [ 573.276686] ? add_taint.cold+0x16/0x16 [ 573.280682] ? irq_force_complete_move.cold+0x7b/0x7b [ 573.285865] ? ___preempt_schedule+0x16/0x18 [ 573.290313] watchdog+0x63a/0xbe0 [ 573.293856] ? reset_hung_task_detector+0x30/0x30 [ 573.298696] kthread+0x31f/0x430 [ 573.302053] ? kthread_create_on_node+0xf0/0xf0 [ 573.306717] ret_from_fork+0x3a/0x50 [ 573.311274] Kernel Offset: 0x1400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 573.322753] Rebooting in 86400 seconds..