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", 0x1000}, {&(0x7f0000000240)="f0c5740490e4b91221995764f021fae6271b6980183c", 0x16}, {&(0x7f0000000280)="ffddc242c37174e92a518cca830ab7453c4ae26b0694ba70891da85e1fb56b36b7362ea6238dcf12fa33e23ff5c6960c095ddc2ee80ce762fff42105db77ae814fab975e9fd2bf4270edb131fddbcd5bd286a30f5671c5bc446148cadcad39635187e68528c943a6584271deeadfc2c228c561f6e6600e8ea982eb8bab697fad2bd67765872d049a259526b984df4cda7973d039820ffd449efab23cbe69d2be3a833af0ceccb8d30e88a79633f1dcce77b7543a57ae9838", 0xb8}, {&(0x7f0000001400)="2ea6b3d5850528621eaace5752035c4ed990d953bf02c7001c8599bf91744ba48b35ad83a255e7c159954dc2f38d47408c993fe215289d36d665524271e966801a70864aca295bdcc0c84146a41e0b1ec98a272a7a4f480ba26b968b7d17f781be2575e94251873ce5dae4ad48cb9fc8645d5a9518d51c70b216a425f3e4ee2af26c709d75f098d6f714dcbcdfa1fb7ba2b2e8785e9899af6f1152e4f86afbc33c06639441d3e6ec80b59a30ad11dd72ffcd15dfcbd95743f820e63034932a5d05669e83ba9e1ca3e665039a97206dcfc70feb54a06a1c17e5ceb6d7ac8a85b38d", 0xe1}, {&(0x7f0000001500)="41c9071ad73f33295aec709cf7e9799d24c225f465f42222b2a390b1558975f81e695933fb81e11f20d4dd3e55cec731954bcae21b3360ba47e8b9c3c8ed202f5bed5201eb09e0c4031c0ab76f5fc7645f", 0x51}, {&(0x7f0000001580)="ed53e95aded2d6caf146a2461b61e679a94b84d2331165b8d8aac31637ab439c614be06cb50a834a38408113ed09c0c05ac4145d2d9bf8c4224fbb02e84b6e7d7cf406ffae29fd3dbb88abdcf3b26a3b6c092c95ea67e87f0fac7f9237cd5589f8f1fa03d8492213b88739a1783b5adc73e0863c0e4af6c54747bda9d08bb551f3146f0bb9cbb93b92b5394c970207fd6685eff82b67766953cbfcab8c187a4a8bf34c66998c4272ab3ebd6da44c027bb7b78df948993cb6b169211824c76c17704905f06ebb353b79a522dcefaca9aa1c2e37c97bf5146e9c354b3720e3ca50", 0xe0}, {&(0x7f0000000380)}], 0x9, &(0x7f0000001740)=[{0x40, 0x1, 0x2, "694838fadfdc0f7247a839faa9cfbd8c84fb072463fdce4776d831859fe36793afba0cbd68677a6dfde22270bed3b521"}, {0xa8, 0x0, 0x5, "5e8c80491c600e624630a3337011585dda12944115b40adc46f483a5d1793f84f9d0d25d57d00dc812c9b6f98df6698ad6fa6bc00591e941a0be4b9e7e51e803ef96f749bb92a9155139389f21e467eb9ddfb1b3f1c046fd48096c045406cbb4ebbc30fffb58c89b2cd7c2b7d658941d99ec4a5222b472ba140babe3dd199269d6c368729c25ee715f67b02c079408e52494b71b"}, {0x88, 0x6, 0xed, "bd15fd62ec0bb3edcc0b7ab2014b2e35098f85eeb647efa1ca035f6b5da55219d53bb805d53c86b1b51df6279036728777d413efdf7883a8fe201fe48565909dc604fa7bc4b0ea95cbb8246111d49ac630ef765648c4d7cd87d1dcbe60f919d0f672da41da1706b1a2b1770592a500486326bd1695e74229"}, {0x1010, 0x10f, 0x0, "41ef2e68b6f5e626b986c1dc31aee3c034318bfab0fa1bfb2495cc63c05ad078418722ec0a938d25917eafe40ac1aeb3ac2ef5ff2e0b6132a5eda9a52ea02c1ff39ebcb181a1c25c669a9f4ccaee04a6be194b6ad5448f32d771e0d49650a644c93e058cefdfc341a0964ac699a21655569f3ff1aee6635a6a89752aa8c06c5e352f5760196e511446aad05909a4bf7bbfceeea15ca7013b16337ebb87c1ea43dc1cf0bd455626bafc8ad3d30fa6e4d2e6451d508711a502838fb3d3a91ec63542b73be1f43a608b1a677ec11c4106e71d1f4231c75bdfd1a8921d4610146c53cc6502f16ff4fbbf9b58b37568b60541aafb25a467200d312140a8520ee908b19b1a815817ac71cea1cbc72b9c1cca84f6eabfecf43af1ed4b1d849024a8871446d414f28e60b428b88dfc47d0bd3df3e9ff5ad80ddbeb71e25941a278684d2ffcc98e0361743b056516fe020309b3c0610953c68ec79645013813ded0c4bed60415e95832e80e452c64674a5e6c4b1205cecfeece8f9e0edf1fe733ca89380d9f1131e90600209bf98c6edd1646a01e1127ef9e5e6178bd189ab19c0ef460f07bbb27b63c897fc4f2ec8c12d921ad3495fed063785961d29ddaa4663de5694d44826b0cc2e679552e8b24bbb8ceb27d5148f537528144fc127daadb3ad957044a092af61e94665983aade4c7b19a3f14182acf19339f85b2bf8fd068f3df1be478038ab561d3e0358b1771bd986be1ba07a93040115cd90b2263057c86220c4ffba9ba981c0f3154f5df11f575597fd6b8e99ecbf163191e619861618c72f1734c417618aaf8d637774ff42ebdb8e0a4592b0d12cf71b26f0823fd3234d05f4b08f7109bc74ee4fccc314458db484f3088f0f9a534ee332dbf9c827a52fe58d9927bbda815bb5308d8f03f1f4783ce53c941160f46833c688a2329c7d426594bdced9713f20bddf57b7e67b8a129a1e0ac625fdfacbbb5736d2c12363806677729b8abf423c9a0168e8a03d08533bbfec847319f22540e4dfa4b6cc7c252ce8aca8a80fa5a4958aa6e2d7b380fa5516d238aa879d20cf7c8d0266660d665d7f0d3140f147baf3f5e6fecc0cac730fd80465d0bfbdfb1fc2930c842039a0bb01d3dc5b873f61a1e7f831e84c99cf4a3ee341ec630560919ba86da30234c3a863636d8008e1bbd5cce99a8eeecc1e09da1359687f8197e0aea31fc60d2bf38d2925c7eac77e9dc5bcf1b7addbefedd2fbdf6f7b6544ad623a6c515439ed14c9cbc71d819efa07769cbfd84099e5e222cf8cf400c8b56ccc9789cf327c5a41a839aecb9872d4306d99dc86a435a63002c69d10956739d566bf176b96b74049e99e34f31e57e50911e8bc9e1d1f90ae926b464289584fe04b7a204f1b6bc64160dad11e6e7a1a12c03a704d81cc121d433e109c4707701d61ae25577fe6a8e1ebd0d1f9eee7101de5c2691a143f87ba9af37ede95b84ba88c91cf8a6509f216c1545a6f7192a637514e4db7c73deeec1d0d49c813ae09845db365a30d2226f1d395470d380af76bba154687b91f1cd8b4e9e6105e1442da1700c5e6a11d2cbddc505a4b05bf9cc09b39601b3aa093ea0f2ea4b8ccecdc4b2e78e3220f763e10b2d1b67a19fd2637c3b2975e71ab8e85123459610a41b42c985db546ee596014fa5693a4558a7743d0430b88111d58e94cedcb5e9cc46af0575d1b1b5ac883ac25b2560f1a52dc282533832cb0246bc43cf22d438d71a5c83cede184c5c24e753b2c93011c0bb40410d809244110e403279c6fe37e63e34dd848dca3eafe0e78b1010ce90e87282efcb9660bd309f942fff597f7f6e9b3cc741b952a3d78bfed310d8e099ed7f5e5aaf47970c86e5c2dd6add9ce8964b7e71b31f2038444621bd5cab5f2d7b9529e0f04963d568d1d7b07a5cdf294d52bc7e84717acedc6867958c21b2602a6cf36d0fdff91f34e913b96e1b62a0ac3babb822e45e53c73404febe20aff3f0b4e7e3327aacb6ea945884e9513a3de1e5eb7d26b1f3b60a66f36e876a1da6aecfd89f882f74335ba776aef0db0fc23d72158f17463d2963d10e51371b4b6261a6230ad4915c8f749b656a80422d2755e003e629185d7659e39358f0410afe287791b64fcc5221eaaa47145c82093c9d278809b9aa83ba09c528c3cd5670856539450e6b5cf81d8912f103f4f11a251475d8fee1425fcc31453e3e134e8b64edbf3c5b430b9b249cd275259774f1762edb8405fca4495dc8fafbc08a8cc4749a37678218c7e73d09761a659e566fdf948d7b44c345c1524ff6e084cd99fbcdaa4f3108951622ceb7581206cd6a0b0df4d4e5bc79f88649ae665528ff15027bdb1fa0c0acfe60d222a605e5c35ab1eae498fac3199cab7ee949a181e96a24badd68a19cc18f3d95a7c7e2320cf86ffefacc61489be689961617853bb4958b6bbc097bd92528f9d7329271f14b72a81a2036691a9906b243e355968275e7f3bcf9b95c3f1f9f0f783f3234b69e9651af196b312781943b37b7fbf9ec8d86d761d411548c4a723b959f9869e79083404ccc043ebae01d029495c3d54c3955e2cf42d6f82c37141d6212fd88fd50f787628f4a430b295b57f749843627fec796c2316f2c91969ee86a6c093d659788b4aab2df14fc1fd2f6972de1013a766ce74842177d36eb340301f1d416efde3d196a68d70682b1e7b9fa4ab63b32efbdf3e88d433f850411050d2f7133b0069c0da8b7598153dfcd36b5185453529122782d700e79eb0c7d721450b10a2beeb883621d99d7261e3c5e19fe0f5d6e53bf589a5bee29611884f5ce7f39c0e3471736379767c19ebd737cb11b37813021fb76a8cf0819ab8535cd9ce84bea8fd3b015d5a2e52682f1134509df22a0cc20ac4cf07ee1fac94705d786ef2e9aeab78d5914d3f9a07bc287ab9f66ade99102ebe5b1f2ff1f034c3cac87300b2e559e567d48af56cd1144849a6745a646893e6bf5afea110092c78b7d32a190a882b9f80423e9b978e64c1a58f23f84cd0acc180e19e3f7ed704907e08faa1ef4f62b9081fbce1b165e893af0344720023a2e6991f729a522599e4d0c56dcbfebc2b7d12412c401493c394d7ece082b31ce3cdb1097e02edb9a2bb6fa303b22b9f1a8f0f21cbaeb434d30dddfb20b4145c7c5da862db15e926c3c30fb056210162ac86ecd4d6f41aaa369aedea424d462cff85983114738286e9d2e45af67112d548ad3d65b31c9cb233820b4b6e689cdc3ea087af33e5471f8122ea8fcc1b164adb480ab47bcd03a96bfd0abfd9e745a4f8042e9051e5fc2c594bc5ede31e8af3513baf605e85c19a81a0e808fdcd68da44d821376f1fb85dcb0440cd9a97a6cd52f801b0f0b1b488226f2c3252e9b7d26198169e8453e35b36877afe88a997c6d8e1c54da1e22b2cd9d5bac86437f5b2e4c1e5fd4d2b6374d7296ad1331d01d6331a5dc21416ca05ba4e64455eb02e7da9a4ea36571f092dfcb21b7dad73580d956f185c366f52aeb7d124e18213c5d305e9049343428222e7133efc19622211404df34ef04c7d14453f62b35cb9d52f5d8cc574a90aed6aec47ebbfe156884795bf5f24a6ac89bf82bd3e36e03ca73be76f3015669bbb4d7a0aa450577e0b5ac8c7d7a988d057a80246048a70c2f2fc86d0d2b0725e641532ba5af1b276f67a156c67a806cdfee8049117d7a15c318c1209a53c51df1f79edde79b68dbc75661646367b66c288e86eff54ddc0c5a368d817c8089f105e49f980e79a243c98634b362a63de1e5a9f83b04171686742a7f5963ce47d92d260f0a39e2ec8171d4e974c956ff2b9fd77bc21d0de2b978695bcf2745b64241ff67d72228e5e68385a1d29e728d1eead6deea1413e76f94305ce1550b69cb447573f35d91f837162288c0e09c175f4a86bb69717836f1985c5f8da6d66e8437116f91604d07f5a7600ad70cdf2b5bd9db1ffc334cb4195736c1446c9dd2694662b7bf26141e80bdbc2cbf691fcc41ad08e5a5806c4046bdb87b87029b2be71f71b6c12f75aab71259f8373a5a9a58c099baf1fa49d3ef9a3f600ad9d7b1c8954e7bbe8eb0d49b3317a3a4f6e5859ed9253fcf829e81f2998b4069df66960aee1090b588e21f9d6107fb1e3cb44d5a2b9c9460340c1816ae090687ac67b48db4ab4eb499d258ff35a94e3a5f79a6a3e2d5400d8ac9bfb31f16227b983048fab16c87cfdee6b76d165d98ebda2650d18ad4266a9a47578163a99f333c76b7cb44ae3f569a0cae70dbf1ce69463f298c7e1202cfafe3e57792447e9710c56edd8687f9520684aa071f0b8e0559c817db3482c655d5b6280add81fa598a62411bfeb99631a41e13f9aa208db2ca3004d78421dfda0d4e355aedee1abd08ad43e473db8a299551f26277d1cd4acbf19ff3c863d5acfc6531480a1832b48e84eb392f7f5e29adf86f4c74038b560d14328a549d6a5fa1fcc4af0ef19e96b65d5f4143b0d5ea04980662a84617bde477e3ab856e44f0fe2fee4ecd2964f83933ea23ab8ec84a1f5f33777e5f5fccf22cd4947c44e4502203e81c07f6d9d88e1497a89b81b327a8f3958709708a85d34eac7179485c8d1daae301a3a3ef056c641756b61a7c34e44c9b1107a86d01d97a689d654ce9437db08322ab5b4b32378e0856b28d1c4ca28c65674c8bc937ee1fe10ea5025a065ff94e22707adab55b000a59ca9c69e87ecbacbb908f6498cc07713bf2cda3ba559b7da839f711e2ce23fb594cf8253d7c05755b8d66befb591ffc8e7b2f350b91cc439acec75f64112a85c705280535f9f45ae8b814ff3f83b9d0c5043f6b91766201b6734547f7f3ef8d88ed1c5c8063b07d725b2ba0f7a6729efc4a3966564654deb42b13cd1a49005f032d3c3f6466a8e70098b550af52c38caacd5670b293e34ecda6ee6a39a4a3e569d2f7f3731106af2b33bbabc0ce13a370dddb4145b62ae63f0259ea59fc79598a820a0de56f2d4854099eb21bc9b9be42f35a8aa030fc63391a1e2009698e081d48a3f17315c6afb8dbf9859aabee21fb2c028aa706624f848d7ef75178370aa27b3cd228fd175664800956b4dbabe1953df107042fd64d00653fb2911f73c2c5da22244db7041c49a9f8605821e7b0796b5fc7c511617d079ffbfdcfb0c7ed830664713b804bd362965cdcb93c28f5ba59db7deafc21ff386ab26e79a1d4c5cf7eaa711faf8a5bbbd70108023808b711aabcf669de991b6b6065e8a9a4fa6702c7c452fba838c75695e86e991be9041776f2e92bd9a7f0f128cb69ef244dfcbc1a1b802eaaf32fc2c13234675de72e4a073d47956fd5a5ae1cc242522e1d54f721b3b555ddcc9d9e751a07ced1e024eee8d70afc155d7c057d7e96fb4fa3dd69c1bba49a0f6473e19879eb12264e1284523d0423870de2b7bfa5c203bf4396cd7cdf2a339aabe959050804caa014a873fac7b9efc3e018fa086f1ec318f302a7bfaa35eb50cae744b8c2318c1b78113802b36591fe3a26c7a4f52aa7e62a4e7306879c7a5186c8c9836933ebefa1c69295507ad124de6e43dd710227c94682c056c3b3fca698dd8fb7cf4b3a811300b89d2254c6ab2d3295b2f8f3c63633520409dfea626f43f498d21f6141c99178d221fccff4c7fbc3862df55c7fb391b0194f7c38d3103480a916180afd99051300fb85acf680bca9a308193a3846eb600b6653cdab55ed5800d9bdc9f8c4bd19af308809fbaabc80b8a2423440df30e3422b184b71a50c6e14bade1de9cedc5eaac0327e388d4e322acff2b38fc"}, {0x78, 0x107, 0x3, "916635b76901762b464a8ce14e05e80dafba2ef61f143f99f3a8df8ad290d1c342298ca8ad87cd735f5f23a4a66e7b4040162d8cb9b1a238569ec04368b689df2f2b12a9fd68608256a75813ea2ec910b46387ababc22ea5431cf677977e88b32fe5"}], 0x11f8}}, {{&(0x7f0000004300)=@nl=@proc={0x10, 0x0, 0x25dfdbfe, 0x40000000}, 0x80, &(0x7f0000002a80)=[{&(0x7f00000029c0)="aeac1600bcac776ec8e134115bdf6bccd53d1950bc3dc4b8494dfef2209b7247f46a33850309b5e69e2faae98a8b95c19e4cd6725050f6ceb5b8491acc26ed491ab6c955c80dc6880a4002b72310dfd1ac85ccd9c446158b876c2676ee32bbfd1639383b234720316a110db4039e3586a450444151995fd86e024cd4237cb9878b64051292bad11036d045a0166f", 0x8e}], 0x1}}, {{0x0, 0x0, &(0x7f0000002bc0)=[{&(0x7f0000002ac0)="adfd435e8b5bd94ad7c59d6285e13f2acec1f5015aabe33d168e8880198e4c2768921b1912fb5da8c5a40f7b1a6d459db6ba59c8b4dfaf1e92ca7e796e037cd894b55b298833e5f1a1cd592499fb4d94ed5ea105e4d455ac0cb6e4ef989474d5801754b5d7be74ed0d6429b5ae74928aeba3851f4e0f68be2df7bfbae50635e45f18f1be1b8bb274ffc69b354e05bf6829ca5ceedd8bbcec3c059b9dfc1745d3eaeef2bdaf52277df3b79a2dd98ca0dbdd29f24baa6bf12cfd32771b400234089c3621b7997c661a59301f6eaa2cf2ce0390a2ac7d80421006c0de1de33884bbdf808310c0d809ee1e9fc97e67de75449aa3f13aeeb1266474acc83fe634", 0xfe}], 0x1, &(0x7f0000002c00)=[{0x40, 0x103, 0x20000000, "06f410d32e0adf3b2be7241c71b9a6e3259ceaf2da4c1a259fb9d64c4ab03a04d1a89ced49dec8fbf1974a6daf5013a3"}, {0xf0, 0x84, 0xfffffffb, "122143d46f561e3b261b91e1f1355b1ce818e506e80135a29c18d0fb03e89546ff5fc37a6a254698c240e05e854542606dc44d5a55e20eca2cb9b3ac08c00af6839680fe4ebcbfc48e44036719f413f6566df44839338879dd2ee49a884deb91802291149396cd8619d4c5000d2f612baec3b00a57c9ce167155e9f1b017d66b8ce1233140bfe07f0aff03ecaad8458526055d87fbe93092bcdaefab6fa1de834db44950693c8d70c61eb2bba9639583df3d1654d92fc63b6959a983097e4c51bdc77e093cfc7be4e66042948198daed9d1c838d0acb3b265f"}, {0x108, 0x117, 0x4, "de1e48e30b24455d28d9a2580bd2ef017e462341fcc5b7e015cf141403f53bb419b590b0eb910e379e94034b5734054d82856e041c7f85a7ecba3c0c21ba4a9dc74512d0f7989e727cdf40fe23cf807852c7918dd8b4dc53dcbb2d0ae670e9debaa0f399c824f46d925b2653d475fc04837a2751741fb8cc374c0a95e14f7a07f095cd20e71be212b8ef355aa1756fba26896916e5dacfab8375fa3dc6546472249de2b4729b91a4f9596e44ce2a47c72967241ff871c81a8f9f1ed70c215b5462476412faefabb77b675cdee31eeab060963c267b6384cd04e226564c1e0d17a2f4b50cef2eb4031575357b7fc8d807813d"}, {0x108, 0x11, 0x9, "0b0d0bc7af7fd8cfcbc80c33f849c220dbbf376c2a62d927638e34053632c8c1f7d55056e0f48abde5ed00a6923b3489c0cb3421e987d3ee06ec23d8ab69a3cfbb54f5355476964232275fc0d2d4df587dda602dc2633005aa44b2c31235b68c49d309844afa637fd7b67cd74474069bba36848cdcb0ba74712f7ce75a6e6cff65f6b8d074da99627890b19abe6ca7277df93480eff1cb70bd00ebde15a1847c5a0139ea244ccf02d826bb2d30c9b75baa8ba1bfc807abade02b4f3dacb96465c764aa4515e626e9ae3d75303484b2152d7a15a38e96cfdeef29d3453fc952ed5e05b0ff44f664c3404f2884da34435205"}, {0xc8, 0x10a, 0x10001, "2c4ca00860ec0a47411dc4a3b20a8aa497402117116b93c298b06a8ba6b8b7a39927456e8f0888d567ef4aed8241f0ae9ac74ca034eba5300fbac6263e9683af10888546884a3d5ee503b8d4662eb7594343916dd7d8833f1fb1bca1e89e6572ecefbf7206cc3e4c0a473b29efa1db9db48dc15f38d488ca6d3c5f458f9792a758880a90f5eb9e416c61a50580671b7b5dbac4346a443a56e2deb5e2fd379d54fa78c9e1c896fcc602c1c2085c7267bd56a0a84b"}], 0x408}}, {{0x0, 0x0, &(0x7f00000042c0)=[{&(0x7f0000003040)="a7b6b57997e95ed49ecc94695c5fbba074d1d599e299d30d38dbc4682ec03c389b086709ac7c3e199364a88106395cb7b7f9d23b8c357523f463cebfd788ad0d4a9e0ffbacfad5720aa76a83f3b5511f36680fe810ff23711acb4f2715726c60160008000029c36e4c437366cdda26aaab59375d331eff780a645840691f128d6bad714f46d2d5f0146aae4c8d9ae61ba9f4db42acf9e58c074e1f8fcb7ba27eb6be7360edb1f5354f9f799f870217ee7d85ad1b97ae350dca7ea972f7a02632abca5ef5d80d65758597b08fb47c552a224c453529cddbe248", 0xd9}, {&(0x7f0000003140)="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", 0x1000}, {&(0x7f0000004140)="5de80a4b9eeabf97afc712561f61c01b9ce9dda765cdff5e1f712f01ac41b089d5f51739109a48be85120260bcabbe264b7e269417e263bc5593bc63b77762005143f911b11de645649892e006dd69a9428863", 0x53}, {&(0x7f00000041c0)="781e8957ddd289cd017ec1ab75b9c48eb61df8e2ed90e12d40d3de473560a51ac72c016c04268d9073b3dc3c4a703faf83f88e594fdc14709150eeef0c42d2ef462b0ad7ed817f8f1ace69677df32483e2d867559afe9df25ccddf55e196a705445f8c1b4b6cc096cb7394c779c1c4080bb2698f8010c5f8f616d03c853bf8ec3e2996a1476afed3d4bd9ab9609980ed55c480ab5ac2f0761ee6340491e265773c1ca49d098188e4b246a0cb34a576b8dd2dab264254e14864499bda452f60eae1e00a60d3ee4ac749e41896e92488b0004e8d2317e43cfc1cda05f1d10819292abf930e7462f047406f1b3c8430148df8f3cc3bfb", 0xf5}], 0x4}}], 0x4, 0x42000) open_by_handle_at(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="3f0000000000d0dd91f60000"], 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r2, 0x8008f512, &(0x7f0000000000)) recvfrom(r0, 0x0, 0x0, 0x40010102, 0x0, 0x0) 07:00:09 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174400204090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:09 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000300)={{}, {0x0, r0+10000000}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)) 07:00:09 executing program 0: sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x9c491110c2bf489a) 07:00:09 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000740)={'syztnl1\x00', 0x0}) 07:00:09 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174800204090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:09 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="c00000000406ff0853010001683fefb3ff21986a050004ff021b00000900220073797a3000b200000700010006"], 0x54}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2e5) splice(r0, 0x0, r2, 0x0, 0x447fe7, 0x0) [ 2093.956482][ T4107] loop5: detected capacity change from 0 to 255 [ 2093.974550][ T4107] FAT-fs (loop5): count of clusters too big (3932158) [ 2093.981381][ T4107] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:09 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8201020004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:09 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174c00204090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:09 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x1) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@pppoe={0x18, 0x0, {0x0, @random="b543abfe8c02", 'bond_slave_0\x00'}}, 0x80) 07:00:09 executing program 4: syz_open_procfs(0x0, &(0x7f0000000480)='net/netlink\x00') 07:00:09 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2094.083048][ T4138] loop5: detected capacity change from 0 to 255 [ 2094.106919][ T4138] FAT-fs (loop5): count of clusters too big (4227070) [ 2094.113741][ T4138] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:10 executing program 4: fork() waitid(0x0, 0x0, 0x0, 0x40000009, &(0x7f0000000100)) 07:00:10 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002280)=[{{&(0x7f0000000000)={0xa, 0x4e1f, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000003480)=[@flowinfo={{0x14}}, @dstopts_2292={{0x18}}], 0x30}}], 0x1, 0x0) 07:00:10 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174400304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:10 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8001120004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000), 0x4) 07:00:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000280)={0x40c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x2d4, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}]}, {0x4}, {0x228, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xde}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x218, 0xd, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xdc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0x1, 0x7, 0x0, 0x800, 0x0, 0x1, 0x1]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x24, 0x1, [0x30, 0x5, 0xc, 0x30, 0x1, 0x24, 0x5, 0x39432fe43d5929fe, 0x18, 0x4, 0x3, 0x24, 0x0, 0x1c, 0x5, 0x12, 0xb, 0x18, 0x12, 0x16, 0x6e70d6d346dd364e, 0x16, 0x30, 0x1b, 0x4, 0xc, 0x24, 0x2, 0x30, 0x12, 0x5, 0x50]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x2, 0x401, 0xf144, 0x200, 0x800, 0x1, 0xff]}}, @NL80211_TXRATE_HT={0x2f, 0x2, [{0x2, 0x9}, {0x0, 0x9}, {0x1, 0xa}, {0x1, 0x3}, {0x1, 0x2}, {0x7, 0xa}, {0x4, 0x8}, {0x1, 0x4}, {0x0, 0x9}, {0x1, 0xa}, {0x7, 0x9}, {}, {0x3, 0x2}, {0x5, 0x6}, {0x5, 0x9}, {0x6, 0x1}, {0x5, 0x8}, {0x4, 0x1}, {0x6, 0xa}, {0x3, 0x8}, {0x6, 0x9}, {0x2, 0x9}, {0x0, 0x1}, {0x7, 0x6}, {0x7, 0xa}, {0x4, 0x1}, {0x2, 0x4}, {0x4, 0x1}, {0x5, 0x2}, {0x2, 0x8}, {0x4, 0x6}, {0x4, 0xa}, {0x6, 0xa}, {0x7, 0x2}, {0x4, 0x1}, {0x2, 0x7}, {0x1, 0x4}, {0x4, 0x9}, {0x4, 0x2}, {0x6, 0x7}, {0x5, 0x4}, {0x4, 0x8}, {0x3}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1f2, 0xffc1, 0xb8b4, 0x10, 0x8, 0x4, 0x3, 0x4]}}, @NL80211_TXRATE_HT={0x27, 0x2, [{0x1, 0x5}, {0x5, 0x5}, {0x0, 0x2}, {0x3, 0x9}, {0x7, 0x9}, {0x7, 0x1}, {0x3}, {0x6, 0x7}, {0x2, 0x2}, {0x6}, {0x7, 0x5}, {0x2, 0x9}, {0x6, 0x2}, {0x5, 0xa}, {}, {0x5, 0x1}, {0x5}, {0x7, 0x6}, {0x5, 0x2}, {0x0, 0x3}, {0x7, 0x6}, {0x1, 0x7}, {0x3, 0x7}, {}, {0x1}, {0x2, 0x8}, {0x2, 0x6}, {0x1, 0x7}, {0x7}, {0x1, 0x5}, {0x4, 0x4}, {0x2, 0x9}, {0x7, 0x3}, {0x2}, {0x7, 0x7}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_6GHZ={0x74, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x36, 0x2, [{0x2, 0x5}, {0x3}, {0x2, 0x8}, {0x6, 0xa}, {0x6, 0x4}, {0x6, 0x4}, {0x5, 0x4}, {0x0, 0x8}, {0x7, 0xa}, {0x3, 0x1}, {0x7, 0x5}, {0x5, 0x9}, {0x1, 0x2}, {0x3, 0xa}, {0x1, 0x9}, {0x6, 0x4}, {0x3, 0x5}, {0x6, 0x2}, {0x1, 0x7}, {0x1, 0x7}, {0x5, 0x6}, {0x6, 0x6}, {0x7, 0x7}, {0x5, 0x2}, {0x5, 0x9}, {0x4, 0x6}, {0x2, 0x9}, {0x6, 0x7}, {0x3, 0x5}, {0x7, 0x2}, {0x2, 0x3}, {0x1, 0x7}, {0x3, 0xa}, {0x0, 0x8}, {0x2, 0x9}, {0x4}, {0x2, 0x9}, {0x6, 0xa}, {0x0, 0x3}, {0x0, 0x9}, {0x1, 0x5}, {0x4, 0x4}, {0x2, 0x1}, {0x4, 0x7}, {0x4, 0x4}, {0x6, 0x6}, {0x5}, {0x5, 0xa}, {0x6, 0x1}, {0x2, 0x3}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x800, 0x3, 0x6, 0x5, 0xff67, 0xfff, 0x8]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x5, 0x3ff, 0xea9, 0x2, 0x86b9, 0x85, 0xe66a]}}]}, @NL80211_BAND_2GHZ={0xb8, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x17, 0x2, [{0x4, 0x1}, {0x1, 0x7}, {0x1, 0x3}, {0x5, 0x7}, {0x7, 0x7}, {0x1, 0x7}, {0x0, 0x2}, {0x1, 0x5}, {0x7, 0x5}, {0x3, 0x6}, {0x3, 0x9}, {0x0, 0x2}, {0x2, 0x9}, {0x7, 0x5}, {0x1, 0x9}, {0x2, 0xa}, {0x4, 0x3}, {0x0, 0x2}, {0x6, 0x4}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x1, 0x5, 0x5, 0x6, 0x1, 0x200, 0x1f]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x3, 0x9, 0x1f, 0xce58, 0x0, 0xcd, 0x9]}}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x60, 0xb, 0x21, 0x1, 0x36, 0x12, 0x2, 0x1, 0x60, 0x6c, 0x48, 0xc, 0x36, 0x12, 0x36, 0x4]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x40, 0x1, 0x3, 0x6, 0x53, 0x7]}}, @NL80211_TXRATE_HT={0x32, 0x2, [{0x3, 0x2}, {0x1, 0xa}, {0x1, 0xa}, {0x5, 0x9}, {0x0, 0x5}, {0x0, 0x4}, {0x1, 0x4}, {0x7, 0x5}, {0x7, 0x2}, {0x5, 0x6}, {0x5, 0x2}, {0x3, 0x7}, {0x4, 0x3}, {0x3, 0x6}, {0x6, 0x5}, {0x4, 0xa}, {0x1, 0xa}, {0x1, 0x8}, {}, {0x4, 0xa}, {0x1}, {0x7, 0x5}, {0x4, 0x7}, {0x1}, {0x1, 0x9}, {0x1, 0x3}, {0x0, 0x2}, {0x5, 0x8}, {0x5, 0x6}, {0x2, 0x5}, {0x4, 0x1}, {0x3, 0x9}, {0x4}, {0x5, 0xa}, {0x3, 0x6}, {0x1, 0x7}, {0x6, 0x1}, {0x1}, {0x0, 0x3}, {0x6, 0x5}, {0x3, 0xa}, {0x3, 0x6}, {0x4, 0x7}, {0x4, 0x9}, {0x6, 0x7}, {0x3, 0xa}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}]}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}, {0x98, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x400}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x60}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x60, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x5c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x7, 0x1, [0x2d, 0x6c, 0x48]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xb6b9, 0x38a0, 0x0, 0x1ff, 0x1, 0x1ff, 0x1000, 0xc0]}}, @NL80211_TXRATE_LEGACY={0x12, 0x1, [0x3, 0x24, 0x36, 0x3c, 0x1b, 0x48, 0x4, 0x1, 0x6, 0x36, 0x6, 0x2, 0x6c, 0x3]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x5, 0x8000, 0x1, 0x3, 0x20, 0x7f, 0xb35]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x2, 0x8286, 0x7, 0x5, 0x4, 0xff, 0xf2a]}}]}]}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0xfffffffffffffffc}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}]}]}, @NL80211_ATTR_TID_CONFIG={0x124, 0x11d, 0x0, 0x1, [{0x34, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0xffff}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x7}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x99}]}, {0xec, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0xffffffffffffffa3, 0x7, 0xd}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x6e85}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x10001}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x8c, 0xd, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x58, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6, 0x2, 0x3, 0x200, 0x101, 0x9, 0x4, 0x1]}}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x10, 0x1, [0x3, 0x2, 0x5, 0x30, 0x16, 0xc, 0x36, 0x16, 0x5, 0x12, 0x6, 0x0]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x800, 0x1, 0x0, 0x3, 0x80, 0x92b, 0x1ff]}}, @NL80211_TXRATE_HT={0x13, 0x2, [{0x6}, {0x3, 0x4}, {0x5, 0x8}, {0x1, 0x7}, {0x1, 0x7}, {0x3, 0x7}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x2, 0x9}, {0x3, 0x2}, {0x7, 0x7}, {0x0, 0x1}, {0x1, 0x3}, {0x3, 0x7}]}]}, @NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x13, 0x1, [0x18, 0x1, 0x6c, 0x36, 0x60, 0x48, 0x6c, 0x48, 0x24, 0x48, 0x48, 0x36, 0xc, 0x1, 0x1b]}]}, @NL80211_BAND_2GHZ={0x18, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x14, 0x1, [0x1, 0x18, 0x6, 0x6, 0x43, 0x1, 0x12, 0x51, 0x12, 0x4, 0x6c, 0x48, 0x36, 0x9, 0x48, 0x1]}]}]}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x7}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xdc}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}]}]}]}, 0x40c}, 0x1, 0x0, 0x0, 0xa4}, 0x4008000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x2) getsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000740)={@broadcast, @local, @dev}, &(0x7f0000000780)=0xc) r2 = syz_open_dev$vcsa(&(0x7f00000007c0), 0x9, 0xb8000) setsockopt$sock_void(r2, 0x1, 0x0, 0x0, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write(r3, &(0x7f0000000180)="3d5422b7efc60c549ad12f4cb2ff914235a34535a7d17742fb40c0edf356900932fe05519e0ae542e42debcaa69c2f33d1060e25baa9728a658b0bd8247097d11c9b9311a31391d93a91f2870d0a89d729df28a00c7ed8a1f135744daaf797d87e2012044d8e2ef4d9083e74982fa5d156ee880ad41c197bd5dcf96d6e21fc26fef4d6fac0a4eddd56c3538790a9a921f9c61bdfe475412ff19c6e9aab7f35", 0x9f) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) r5 = socket$inet6(0xa, 0x2, 0x80000000) sendto$inet6(r5, &(0x7f0000000000)="4769a31211217ca8adfd2a375636a2ef41bcd0d2506f575b0fd501b7b016fad4bbc765c51d5556c2bae15f5a624a56d39bee912c9de3e31601e2e8ba2b5f5ab41e56a4e07c02b233161e7e8fae00d33c588870172d094a8a470a65799442641928e0ea60cc65ea599942898622427078bd64d237aebb85b203cfdc30da523f3bb1026f4d2869633a76603fb69718d617f8c4a0338a3bc5c18afc7ffd05124dff6419239a8269952dcbe1aa23907c0bdd077e67d1d34b8c7d1d8a7023aa214de3906bbe459d29d0fac53f1b55b795a9bd708328dcd2af32b799ac7ee6908cf43f7e6da07b53f5a4db", 0xe8, 0x0, &(0x7f0000000100)={0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, '\x00', 0x2d}, 0x4}, 0x1c) 07:00:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x0, 0xa, 0x101, 0x70bd2a}, 0x14}}, 0x0) 07:00:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000bc0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x0, 0xfff}]) 07:00:10 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174800304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) recvmmsg$unix(r1, &(0x7f0000006680)=[{{&(0x7f0000000040), 0x6e, &(0x7f0000000300)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1, &(0x7f0000002440)}}], 0x1, 0x0, &(0x7f0000006800)) 07:00:10 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661748a0304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2094.842614][ T4161] loop5: detected capacity change from 0 to 255 [ 2094.870273][ T4161] FAT-fs (loop5): count of clusters too big (4456446) [ 2094.877175][ T4161] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:10 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @local}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000080)="8d", 0x1}], 0x1}}], 0x2, 0x0) 07:00:10 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8001220004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:10 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661748b0304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x2, 0x4) 07:00:10 executing program 0: syz_open_procfs(0x0, &(0x7f0000000040)='environ\x00') 07:00:10 executing program 4: clock_gettime(0x720189f075664a67, 0x0) [ 2094.970661][ T4191] loop5: detected capacity change from 0 to 255 [ 2094.980707][ T4191] FAT-fs (loop5): count of clusters too big (4718590) [ 2094.987590][ T4191] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:11 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1a, &(0x7f0000000040), 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:11 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661748c0304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:11 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x2010, r0, 0x0) 07:00:11 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000003f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8085) 07:00:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) close(r0) 07:00:11 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8001820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:11 executing program 4: clock_gettime(0xde4b7b4c36b5e601, 0x0) 07:00:11 executing program 0: pselect6(0x40, &(0x7f00000001c0)={0x4}, &(0x7f0000000200)={0x2}, 0x0, 0x0, 0x0) 07:00:11 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661748d0304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:11 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000008980)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000001400)=[@dstopts={{0x18}}], 0x18}}], 0x1, 0x40) 07:00:11 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8001920004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2095.748904][ T4216] loop5: detected capacity change from 0 to 255 [ 2095.779077][ T4216] FAT-fs (loop5): count of clusters too big (6291454) [ 2095.785892][ T4216] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:11 executing program 4: pselect6(0x69, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) [ 2095.862994][ T4237] loop5: detected capacity change from 0 to 255 [ 2095.871731][ T4237] FAT-fs (loop5): count of clusters too big (6553598) [ 2095.878546][ T4237] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:12 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) sendto$inet6(r1, 0x0, 0x0, 0x22040055, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @mcast2, 0x1}, 0x0) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 07:00:12 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000001c0)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x4008004) sendmmsg$inet6(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 07:00:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r1, 0x2, &(0x7f0000000100)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000000)="8526097489f8", 0x6}]) 07:00:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174900304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8002020004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:12 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) 07:00:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174910304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:12 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, 0x80) 07:00:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174920304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:12 executing program 2: pselect6(0x40, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={0x3}, &(0x7f00000002c0), 0x0) [ 2096.670636][ T4249] loop5: detected capacity change from 0 to 255 [ 2096.690708][ T4249] FAT-fs (loop5): count of clusters too big (8388606) [ 2096.697650][ T4249] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:12 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0xe81) 07:00:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8102020004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2096.786940][ T4275] loop5: detected capacity change from 0 to 255 [ 2096.797010][ T4275] FAT-fs (loop5): count of clusters too big (8404990) [ 2096.803826][ T4275] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000006e40)=[{{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000000000)=""/119, 0x77}, {&(0x7f0000000080)=""/181, 0xb5}, {&(0x7f0000000140)=""/166, 0xa6}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/72, 0x48}, {&(0x7f0000001280)=""/12, 0xc}, {&(0x7f00000012c0)=""/4096, 0x1000}], 0x7, &(0x7f0000002340)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000002380)=@abs, 0x6e, &(0x7f0000002480)=[{&(0x7f0000002400)=""/8, 0x8}, {&(0x7f0000002440)=""/25, 0x19}], 0x2, &(0x7f00000024c0)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}, {{&(0x7f00000025c0), 0x6e, &(0x7f0000004840)=[{&(0x7f0000002640)=""/43, 0x2b}, {&(0x7f0000002680)=""/231, 0xe7}, {&(0x7f0000002780)=""/4096, 0x1000}, {&(0x7f0000003780)=""/4096, 0x1000}, {&(0x7f0000004780)=""/138, 0x8a}], 0x5, &(0x7f00000048c0)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f0000004940), 0x6e, &(0x7f0000006ac0)=[{&(0x7f00000049c0)=""/4096, 0x1000}, {&(0x7f00000059c0)=""/4096, 0x1000}, {&(0x7f00000069c0)=""/142, 0x8e}, {&(0x7f0000006a80)=""/20, 0x14}], 0x4, &(0x7f0000006b00)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000006b40)=@abs, 0x6e, &(0x7f0000006dc0)=[{&(0x7f0000006bc0)=""/50, 0x32}, {&(0x7f0000006c00)=""/241, 0xf1}, {&(0x7f0000006d00)=""/28, 0x1c}, {&(0x7f0000006d40)=""/18, 0x12}, {&(0x7f0000006d80)=""/52, 0x34}], 0x5}}], 0x5, 0x2040, &(0x7f0000006f80)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @private2}, 0x80) 07:00:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174930304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000280)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc) 07:00:13 executing program 2: modify_ldt$write(0x1, &(0x7f00000001c0), 0x10) 07:00:13 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8002220004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000a40)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="24000000000000002900000032000000ee"], 0x28}}], 0x2, 0x0) 07:00:13 executing program 4: waitid(0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0) 07:00:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174c00304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:13 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev}, 0x1c, 0x0}}], 0x1, 0x8800) [ 2097.608655][ T4297] loop5: detected capacity change from 0 to 255 [ 2097.645688][ T4297] FAT-fs (loop5): count of clusters too big (8912894) [ 2097.652524][ T4297] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174fd0304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:13 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/block/loop3', 0x595c2682e82c6064, 0x0) 07:00:14 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) pselect6(0x40, &(0x7f0000000040)={0x101}, 0x0, 0x0, 0x0, 0x0) 07:00:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000480)={0x14, 0x10, 0x4, 0x101}, 0x14}}, 0x0) 07:00:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174fe0304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:14 executing program 4: io_setup(0xf2c1, &(0x7f0000000180)=0x0) io_submit(r0, 0x0, 0x0) 07:00:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8002520004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r1, r0, 0x0, 0x10000031b) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000580)={0x1, 0xdc, "483886fab86f0502cb5d9f0f0bd9c8cb40412e5ced7ca90644526953bc4a4d7aef85ca865d527b2d0e81c246918e2ca9c6bf8e482e44bc057ba66bf0bee05737757f8aa142279c90bc4d5fc55ed36e860e494d523b8aa17510fb248ffd3df7ba3f938c6102e55fb7bc52e2422a76a6b3425016380639bb14db9ecdc07f5933ab80d8e1cd506c99cbc1cda3aed15e61e40b247835d471322823ed98867ebe0861b10b5c34f6a49d4dfbb2916c5feb9f622fe67e99f03a063e6d1e4be0609074a10cafebb482e5942c9ae0c514e820850b696708546d1ca1574cfc4f48"}) r2 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x91, 0x6, 0x7f, 0xe9, 0x0, 0xffffffffffff8000, 0x0, 0xe, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000000), 0xc}, 0x1840, 0x4, 0x5, 0x1, 0x3, 0x1, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x6) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0), 0x6e, &(0x7f0000000340)=[{&(0x7f00000004c0)=""/180, 0xb4}, {&(0x7f0000000200)=""/71, 0x47}, {&(0x7f0000000140)=""/67, 0x43}, {&(0x7f00000002c0)=""/19, 0x13}, {&(0x7f0000000480)=""/41, 0x29}], 0x5, &(0x7f00000003c0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}, 0x40000000) close(r3) socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r2, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:14 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f0000000000)=""/9, &(0x7f0000000040)=0x9) 07:00:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174020404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:14 executing program 2: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x0, 0x0, 0x0) 07:00:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000340)=[{{&(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c, 0x0}}], 0x2, 0x0) 07:00:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174030404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2098.494772][ T4326] loop5: detected capacity change from 0 to 255 [ 2098.515722][ T4326] FAT-fs (loop5): count of clusters too big (9699326) [ 2098.522545][ T4326] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:14 executing program 2: syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter\x00') 07:00:14 executing program 4: add_key$user(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xffffffffffffffff) r0 = add_key$user(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x1}, &(0x7f00000000c0)="dc", 0x1, 0xfffffffffffffffe) add_key$user(&(0x7f0000000080), 0x0, 0x0, 0x0, r0) 07:00:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8852720004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:14 executing program 0: socketpair(0x2, 0x2, 0x8, 0x0) 07:00:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174040404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:14 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000000700)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @dev}, 0x1c, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00', 0x2}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@dontfrag={{0x14, 0x29, 0x3e, 0x4}}], 0x18}}], 0x2, 0x0) [ 2098.670699][ T4356] loop5: detected capacity change from 0 to 255 [ 2098.689788][ T4356] FAT-fs (loop5): count of clusters too big (10359806) [ 2098.696737][ T4356] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:15 executing program 0: perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1188, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:15 executing program 2: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[@cred={{0x1c}}], 0x20}}], 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000780)=[{{&(0x7f00000000c0)=@nfc, 0x80, 0x0}}], 0x4000000000001df, 0x0) 07:00:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174050404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:15 executing program 4: pselect6(0x40, &(0x7f00000001c0)={0x1}, 0x0, 0x0, 0x0, 0x0) 07:00:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8882720004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x80, 0xffffff23, 0x400, 0x380000, 0xfffffffe, 0x6, 0x10000}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000580)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01000000000000000000050000002000018008000100", @ANYRES32=r7, @ANYBLOB="140002007665361320a9402eee29726964676500"], 0x34}}, 0x0) bind$packet(r3, &(0x7f0000000000)={0x11, 0xf7, r7, 0x1, 0x1}, 0x14) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) 07:00:15 executing program 4: io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r0, 0x1, &(0x7f0000000bc0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff4b}]) 07:00:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001a40)=[{{&(0x7f0000000040)={0xa, 0x4e21, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x188}}], 0x2, 0x0) 07:00:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174060404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2099.380845][ T4380] loop5: detected capacity change from 0 to 255 [ 2099.398728][ T4380] FAT-fs (loop5): count of clusters too big (10362878) [ 2099.405615][ T4380] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000080), r0) 07:00:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname$unix(r0, 0x0, &(0x7f00000005c0)) 07:00:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174070404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8003f20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002280)=[{{&(0x7f0000000000)={0xa, 0x4e1f, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000003480)=[@flowinfo={{0x14, 0x29, 0xb, 0xffff}}, @dstopts_2292={{0x18}}], 0x30}}], 0x1, 0x0) 07:00:15 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000009c0), 0x8, 0x0) fgetxattr(r0, &(0x7f0000000040)=@random={'security.', '\x00'}, &(0x7f0000000080)=""/38, 0x26) 07:00:15 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) [ 2099.516750][ T4405] loop5: detected capacity change from 0 to 255 [ 2099.539227][ T4405] FAT-fs (loop5): count of clusters too big (16515070) [ 2099.546149][ T4405] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:15 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000040)={{0x2, 0x4e22, @local}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x16, {0x2, 0x4e21, @broadcast}}) close(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2400) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open_by_handle_at(r2, &(0x7f0000000340)=@raw={0x4, 0x0, {"d3"}}, 0x0) socketpair(0x21, 0x4, 0x7, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, &(0x7f00000000c0)=0x5, r3, &(0x7f0000000140)=0x8, 0x81, 0x5) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174080404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:15 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, 0x0, &(0x7f00000005c0)=0xfffffffffffffcb0) 07:00:15 executing program 2: syz_open_dev$loop(&(0x7f0000000080), 0xffffffffffffffff, 0x0) 07:00:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8004020004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174090404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x5, 0x0) write$cgroup_subtree(r3, 0x0, 0x15) dup3(r3, r2, 0x0) close(r1) 07:00:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) connect$netlink(r0, &(0x7f0000000280), 0xc) syz_genetlink_get_family_id$smc(&(0x7f0000000240), r0) 07:00:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740a0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:15 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002140)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000002240)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x002'], 0xf0}}], 0x1, 0x0) [ 2100.260297][ T4427] loop5: detected capacity change from 0 to 255 [ 2100.288591][ T4427] FAT-fs (loop5): count of clusters too big (16777214) [ 2100.295487][ T4427] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740b0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:16 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') 07:00:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0xcd, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @empty}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:16 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8004820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:16 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740c0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:16 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000000)=0x8, 0x4) 07:00:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='coredump_filter\x00') sendfile(r0, r0, 0x0, 0x80000001) 07:00:16 executing program 2: timer_create(0xf, 0x0, 0x0) 07:00:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000003f40)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @empty, 0x9a57}, 0x1c, 0x0, 0x0, &(0x7f0000000400)=[@rthdr={{0x18}}], 0x18}}], 0x1, 0x0) 07:00:16 executing program 4: syz_open_procfs(0x0, &(0x7f0000000040)='net/rt_acct\x00') 07:00:16 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740d0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:16 executing program 0: pselect6(0x40, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000002c0), 0x0) 07:00:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r0, 0x0, 0x1, 0x0, 0x0, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open_by_handle_at(r2, &(0x7f0000000180)=@raw={0x8, 0x0, {"01000000a539"}}, 0x0) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open_by_handle_at(r3, &(0x7f0000000340)=@raw={0x4, 0x0, {"d3"}}, 0x0) close_range(r2, r3, 0x0) bind(r1, &(0x7f0000000100)=@in6={0xa, 0x4e21, 0x1c0d75e7, @dev={0xfe, 0x80, '\x00', 0x2e}, 0x7}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r4, 0x0, 0x10000031b) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f0000000000)=@req={0xc8, 0x8, 0x1, 0x6}, 0x10) [ 2101.200460][ T4472] loop5: detected capacity change from 0 to 255 [ 2101.216757][ T4472] FAT-fs (loop5): count of clusters too big (18874366) [ 2101.223644][ T4472] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:16 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) 07:00:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x802) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "7bc12725d8ef7ffe916da45fb5793da3a22062223cf9a71be33f12c50db89a3d3a8fc57e48de01020ff915743e0e304e6a32dc3f9079ee1a79ce5006209be052", "61253e8b169e0274627cd8e04ef4d23a4f6a82b8c6e523486f007316af75edd8"}) 07:00:16 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8004c20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:16 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x77359400}, {0x0, 0x3938700}}, 0x0) 07:00:16 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740e0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002280)=[{{&(0x7f0000000000)={0xa, 0x4e1f, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000003480)=[@dstopts_2292={{0x18}}], 0x18}}], 0x1, 0x0) 07:00:17 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000004180)=[{{&(0x7f00000004c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c, 0x0}}], 0x1, 0x0) 07:00:17 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') sendfile(r0, r0, 0x0, 0x8) 07:00:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x4, 0x0, &(0x7f00000000c0)) 07:00:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r1, 0x1, &(0x7f0000000bc0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) [ 2101.334798][ T4497] loop5: detected capacity change from 0 to 255 [ 2101.353759][ T4497] FAT-fs (loop5): count of clusters too big (19922942) [ 2101.360654][ T4497] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740f0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x8, 0x3, 0x10, 0xfffffffb}, {0x20, 0x9, 0x27, 0x3}, {0x7445, 0x7f, 0x4, 0x548}, {0x0, 0x80, 0x0, 0x10001}]}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0xfff8, 0xfcb5}, @timestamp, @window={0x3, 0x1, 0x3}, @mss={0x2, 0x3f}, @sack_perm, @window={0x3, 0x5, 0xb}], 0x6) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x2, 0x3, 0x0, 0x9}, 0x20) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000100)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open_by_handle_at(r3, &(0x7f0000000340)=@raw={0x4, 0x0, {"d3"}}, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000002, 0x4010, r3, 0x5115000) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8006020004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:17 executing program 0: add_key$user(&(0x7f0000000040), &(0x7f0000000000)={'syz', 0x3}, &(0x7f00000000c0)='G', 0xfffffffffffffe71, 0xfffffffffffffffb) 07:00:17 executing program 4: r0 = socket$inet(0x2, 0x3, 0x7) sendmmsg(r0, &(0x7f00000042c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 07:00:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174100404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:17 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x3938700}, {0x77359400}}, 0x0) clock_gettime(0x0, &(0x7f00000013c0)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000280)) 07:00:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174110404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x41, 0x41) 07:00:17 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000000740)={&(0x7f0000000000)=@proc, 0xc, 0x0, 0x0, 0x0, 0x15}, 0x0) 07:00:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000002300)={&(0x7f0000001a80), 0xc, &(0x7f0000001b00)={0x0, 0x39}}, 0x0) 07:00:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8026120004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174120404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2102.236990][ T4533] loop5: detected capacity change from 0 to 255 [ 2102.249054][ T4533] FAT-fs (loop5): count of clusters too big (25165822) [ 2102.255925][ T4533] FAT-fs (loop5): Can't find a valid FAT filesystem [ 2102.330184][ T4551] loop5: detected capacity change from 0 to 255 [ 2102.344908][ T4551] FAT-fs (loop5): count of clusters too big (25430014) [ 2102.351826][ T4551] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:18 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) recvfrom(r2, 0x0, 0x0, 0x22, 0x0, 0x0) 07:00:18 executing program 4: socketpair(0xa, 0x0, 0x80000001, &(0x7f0000000000)) 07:00:18 executing program 0: r0 = socket(0x29, 0x2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) 07:00:18 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174180404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:18 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8006820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:18 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x34, r0, 0x1, 0x0, 0x0, {{}, {0x0, 0x3}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'wlan1\x00'}}}}}, 0x34}}, 0x0) 07:00:18 executing program 0: socketpair(0x29, 0x5, 0x7, &(0x7f00000001c0)) 07:00:18 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174190404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000000000000000000460000000800010070636900110076"], 0x50}}, 0x0) 07:00:18 executing program 4: r0 = socket(0x18, 0x0, 0x1) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) [ 2103.185760][ T4577] loop5: detected capacity change from 0 to 255 07:00:18 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000006c0)={0x0, 0x1}, 0x4) 07:00:18 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174220404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2103.229838][ T4577] FAT-fs (loop5): count of clusters too big (27262974) [ 2103.236799][ T4577] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:19 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f0000000180)=@v3={0x3000000, [{0x8, 0xc4}, {0x80000001, 0xb2}], r2}, 0x18, 0x1) close(r0) socket$packet(0x11, 0x3, 0x300) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000280)={'ip6tnl0\x00', &(0x7f0000000200)={'ip6tnl0\x00', r1, 0x29, 0x80, 0x79, 0x800, 0x40, @remote, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7800, 0x40, 0x8, 0x3}}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB="54000000c5d7135225968fe748549f7ad6335aa0f6fadaf400f303005bde1880d463ceea237b64", @ANYRES16=0x0, @ANYBLOB="100026bd7000fedbdf250200000008000b00", @ANYRES32=r4, @ANYBLOB="08000600ac1400000006000a000000000000000000000000000100"/45], 0x54}, 0x1, 0x0, 0x0, 0x40800}, 0x48c5) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:19 executing program 2: clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, r0+10000000}, 0x0) 07:00:19 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000004980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002020, 0x0) 07:00:19 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174250404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:19 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000004980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:00:19 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8006c20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:19 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20044081) 07:00:19 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174480404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:19 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8007420004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:19 executing program 0: unlink(&(0x7f00000023c0)='./file0\x00') mkdir(&(0x7f0000002400)='./file0\x00', 0x0) 07:00:19 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661744c0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2104.101481][ T4614] loop5: detected capacity change from 0 to 255 [ 2104.118038][ T4614] FAT-fs (loop5): count of clusters too big (28311550) [ 2104.124995][ T4614] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:19 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpgrp(0x0) fcntl$setown(r0, 0x6, r1) r2 = getpgrp(0x0) fcntl$setown(r0, 0x6, r2) [ 2104.190769][ T4634] loop5: detected capacity change from 0 to 255 [ 2104.204092][ T4634] FAT-fs (loop5): count of clusters too big (30408702) [ 2104.210960][ T4634] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000000)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast1}}}, 0x108) getsockopt$inet_buf(r3, 0x0, 0x30, &(0x7f0000000340)=""/225, &(0x7f0000000140)=0xe1) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000080)={'veth1_to_bridge\x00'}) splice(r2, &(0x7f0000000000)=0x6, r2, &(0x7f0000000180)=0x79fa, 0x400000000, 0x11) r4 = openat2(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x20001, 0x80}, 0x18) r5 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_elf64(r5, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x63, 0x35, 0x7, 0xff, 0x4, 0x2, 0x6, 0x80000000, 0x272, 0x40, 0x5d, 0xfffffffc, 0x20, 0x38, 0x2, 0x9, 0x8000, 0x400}, [{0x5c2e8b88aae5b929, 0x9, 0x7fffffff, 0x54e64966, 0xfffffffffffffffa, 0x4bcd, 0x807, 0x4}], "09d185665e3b0aeec83317b35a3696bb81794dc57561576698bde3f13ea0d4a680cfeeaf341c252bbedfdbc1a6f17b6bb0654c406a4dbb4fbbde2110180a86c1857348654f87292c5b9d08376c3ec7dc1a5063cc07fbf76fad030c3a830517a93ae9b65d1d7035102cc338f6ffed", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9e6) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000280)={@mcast1, 0x7f}) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:20 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174600404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000002d40)={&(0x7f0000000000), 0xc, &(0x7f0000002d00)={&(0x7f0000002ec0)={0x2c4c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8}], @NL80211_ATTR_CH_SWITCH_BLOCK_TX={0x4}, @NL80211_ATTR_CSA_IES={0x1f08, 0xb9, 0x0, 0x1, [@beacon_params=[@NL80211_ATTR_BEACON_TAIL={0x30, 0xf, [@mesh_chsw={0x76, 0x6, {0x0, 0x0, 0x0, 0x5}}, @ht={0x2d, 0x1a, {0x2, 0x1, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x300, 0xc9}}, @cf={0x4, 0x6, {0x0, 0x0, 0x7, 0x5}}]}], @beacon_params=[@NL80211_ATTR_IE={0x2fc, 0x2a, [@chsw_timing={0x68, 0x4, {0x80, 0x9}}, @cf={0x4, 0x6, {0x0, 0x0, 0x0, 0x1}}, @random_vendor={0xdd, 0xde, "d3c502b2e9247e6d7d28e99d72d710dc424373cf0e4dae41ebc676da6a03f3ba99756a597f9c9d884f65b9140e55a75ecc5cfa283dee6d59c2d8e7821bdd9e4725dbead242da2c619a74baf77cc7d73eb1363fd4deb17b294188f5008b791bc36826e6acd865f25e50b03cfcb19c3166e553e5b08f5238cbea4298dfbdecb456df16582abc2f3eff21cf18b3add045c6500133aab9c9cce1ac58e1acbbf58bcd8a65917744c6280efad7eed1e99b3b279d1f04d9f86f63463c7e1ddd97a407c15fe75626bac7077c11e63766796d89b13239ce7901247a597f9b6e192563"}, @measure_req={0x26, 0xd6, {0x0, 0x0, 0x0, "6672525a3dc047ee209c6aedc8035fc9f5225b36abbd347f9759ad6294025f856dd57e9403eb282162ff7e5c7dd033c41104cf1c062b36f88ce06b5630d75e9fd837d759368de0f466857f6c36b9cae5fcfa861135bbb798a81d023ebb075b61aea8eb0b2613fdde5affb49298cf2607c94d499dfdbeab30aee79c042637aef695e40aad1430d86a7300702c855e8d56bf7addfe7ff1e282c906af735ca5fb4439c9d1c2911ceaa62e6a5af22ba53b1bde784dab75e644d721f0630a63ac4dda76ee372f3f3563f3d127654baacea38a1131ad"}}, @mesh_config={0x71, 0x7, {0x1, 0x0, 0x0, 0xffffffffffffffff}}, @ht={0x2d, 0x1a, {0x1, 0x3, 0x6, 0x0, {0x8, 0x8}, 0x0, 0x3}}, @random={0x0, 0xe7, "22a554f379cfb69137ba6823a90adf9892730043c7306ca4b858877090ca8318349ba728994a923573ab9ef44b916b5c82e9510570e003490dc118ac4a6ced1c755e776f2a2b688f0a4f642cb0ce60b9d9ba853adb06ec231c74063b6d5f3b45a2ed328e3a44436915b4a4056c494c40a224526ef37c7acd15b8228a27616e19a9e66395dcc711429cd4e308a427c143816362fc47ff0a6f65165e622b603721f7cdfac25654abe216e57b6fafa24c50658bdfb7233331a9d7f82d0b96eba3cd424888e0943689e996a0aa78cf254203f40ede09d324aea8279a73dc069105c3a7df7bc11a9bb3"}, @ht={0x2d, 0x1a, {0x0, 0x0, 0x0, 0x0, {0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x1, 0x1000, 0x3}}, @supported_rates={0x1, 0x6, [{}, {0x6c, 0x1}, {0x4}, {}, {0xb}, {0x3, 0x1}]}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x1028, 0x80, [@mic={0x8c, 0x18, {0x363, "024ba34cf435", @long="46c816b2b5e036581056b5ae0c9b43d2"}}, @prep={0x83, 0x0, @not_ext={{}, 0x0, 0x0, @device_a, 0x4, "", 0xfc000000, 0x400, @device_b}}, @measure_req={0x26, 0x1003, {0x0, 0x1f, 0x6, "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"}}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x10, 0x80, [@erp={0x2a, 0x1}, @mesh_config={0x71, 0x7, {0x0, 0x0, 0x0, 0x0, 0x2, 0x3}}]}, @NL80211_ATTR_BEACON_TAIL={0x194, 0xf, [@random={0xff, 0xb3, "44f4d8484348b944c37478a26d78442f82191ebbf5cc2dec5f650c8ea387a9416039d5038418d67379e83b51f9ed82e6a46fd32c5e05b9525eea01dac87b6db0f40211c63b6be590db5b56d373bd43caa0729eb9eff21d07e119b8570a18fea36bfb4e621fd6b8ebf3eedcb7651cea9880aaa482a8a45ad7faa9866d9c4ecc029d5ffd99759f3fabbb453222b3d3537a86e3d7652c98936fc15e2a7a645a8a8956c5c1fdd962069a78f2780502d6e031e2d815"}, @preq={0x82, 0x88, @not_ext={{0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, @device_b, 0x0, "", 0x0, 0x7fff, 0xa, [{{0x0, 0x0, 0x1}, @device_b, 0xfffeffff}, {{}, @device_b}, {{0x1}, @broadcast, 0x2}, {{}, @device_b, 0x3}, {{0x1, 0x0, 0x1}, @device_b}, {{}, @device_b, 0xffb}, {{0x1}, @device_b}, {{0x1}, @device_a, 0x167cde11}, {{}, @broadcast}, {{0x0, 0x0, 0x1}, @device_b, 0x2}]}}, @ibss={0x6, 0x2, 0xabd}, @ht={0x2d, 0x1a, {0x0, 0x0, 0x1, 0x0, {0x1, 0x2, 0x0, 0x2bf, 0x0, 0x1, 0x1}}}, @mesh_config={0x71, 0x7, {0x0, 0x0, 0x1, 0x1, 0xffffffffffffffff, 0x4, 0x8}}, @link_id={0x65, 0x12, {@initial, @device_b, @broadcast}}, @link_id={0x65, 0x12, {@random="0d0481043465", @device_b}}]}, @NL80211_ATTR_PROBE_RESP={0x880, 0x91, "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"}, @NL80211_ATTR_BEACON_HEAD={0x171, 0xe, {@with_ht={{{0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x1585}, @device_b, @device_a, @random="37b7fca88ade", {0x7, 0x3f}}, @ver_80211n={0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1}}, 0x2, @random=0xdd47, 0x0, @val={0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x4, [{}, {}, {0x12, 0x1}, {}]}, @void, @val={0x4, 0x6, {0x0, 0x4, 0xda, 0x9}}, @val={0x6, 0x2, 0x8000}, @val={0x5, 0xb4, {0x0, 0x0, 0x0, "3ed9353bbd368a2a946e914bde45dec7d2c9a46ce14ee21fec9c21a2d42c9bca06704cde231b41aced33b35a5c6c2f34d3ccbc8eba6b131510a3f4bdf82cd9d928edefba898159989c060a70a52dde59b599fb3eb3dd7de9ab752bff2335ce19b91e9b1f2f9ec8ca8375fdca095b648d32d12bf85806d2979d77a8e4dc8612290e355a401c814fa5e40636fa72ac094811140cbffed2adee22e6b4b590373bc2a089c548e7a9ce20b97127b5697d950a55"}}, @void, @val={0x2a, 0x1, {0x0, 0x1, 0x1}}, @val={0x3c, 0x4, {0x0, 0x79, 0x28, 0x1}}, @void, @void, @void, @void, [{0xdd, 0x6a, "f1817df85e6beacbbed23d32c9f456f11408b91bd3eddd345fb165f9d1333aef10c2df74f27fff6e0bd0f3a8d60fa75a25f94e47d96cd354609311683e8a7fb0b63d9755f16cc51befacd414178821c721628cedaca1b4ccecb4587d5afc22a24baef9727b025cdbab53"}]}}], @NL80211_ATTR_CSA_C_OFF_BEACON={0x6, 0xba, [0x7ff]}, @NL80211_ATTR_CSA_C_OFF_BEACON={0x10, 0xba, [0x3f, 0x0, 0x2, 0xffff, 0x0, 0x7]}]}, @NL80211_ATTR_CSA_IES={0xd00, 0xb9, 0x0, 0x1, [@beacon_params=[@NL80211_ATTR_IE={0xa4, 0x2a, [@ext_channel_switch={0x3c, 0x4}, @dsss={0x3, 0x0, 0x1}, @random_vendor={0xdd, 0x8c, "eeb3eabf566afc9d8ce02abb2d35bf1c7a364036a066756a1c835feebd9c7e49fdd9427b530ee48b8820c50d63363d594b557d6f221c65137c13ff68e2442bcd85c92e0385a7b4409075cf9488a23f9e9218eedd8105bde8ba9aa467afe338f9bb6d4a40a5f6ba2a0e9d1311968a44b9c5ed8f0b9eeae43cb41353f04e72dede8c23636dba8de574ea58e2f7"}, @chsw_timing={0x68, 0x4, {0x3}}]}, @NL80211_ATTR_BEACON_HEAD={0x489, 0xe, {@wo_ht={{}, {}, @device_a, @broadcast, @random="04f6936b5f2c"}, 0x0, @random, 0x0, @void, @val={0x1, 0x8, [{}, {}, {0x9, 0x1}, {0x0, 0x1}, {}, {}, {}, {}]}, @void, @void, @val={0x6, 0x2, 0x7fff}, @void, @val={0x25, 0x3, {0x1, 0xad, 0x3f}}, @val={0x2a, 0x1}, @val={0x3c, 0x4}, @void, @void, @val={0x71, 0x7}, @val={0x76, 0x6, {0x0, 0x6, 0xb, 0x9}}, [{0xdd, 0x19, "fe9a98ad3d1b8f7ce9b973f28cb2b0fcaea7fbd803a1ec374a"}, {0xdd, 0xa3, "67a6cdccfb2bdf471b5aa9a89a0c3b55998017ccabcf9f94002f9872d8d1797c4b2b018cd436e1b23912d5af0b472048f17d7d2afc8f14459508b462372bca14e5d7027d54e839875c84fff46a29a18cf04c0c83aab6355b537bf603c1df333d8466dc0363443434a5066dad9d2d0b78b599017c5153bd264f3dc22313ce5d6dfee709e8931082ee9864e06577487feaef1bcd44bbe0247459ab699fa5ed4c4efe478b"}, {0xdd, 0x82, "4085602708db1180556dae3d35005e7d9589f0ceb7b168b04bdc22fcfd6bbb45259b41b60c4002ffe27b06c15533d6816f5ccb462d844a84ec5ccca97b12a1b04bb5c0a39fd5e8ed81e288961da13f7184a3afe793547dfb2bb8eddef9cab056bb5e27fbb04455071c1324c82805ef021572efd44cdbb80c473d7d9e77ab370bfb7a"}, {0xdd, 0x16, "f654f76cfee873d4aab8bdf8570d95e2e8779adc0cb197"}, {0xdd, 0xa2, "8420c6ca7d74d54247daf02533b860b25a4028e8ddbc809ad304a07af371854a690c6e9a31ad3bac44b026d1d69241246c8d31dd979e15bcfa2569330e9a81fdd01c012527a7f91683c26b2e1836ecb87c36b3373208e92c29dc6c7135760f414140fd1683353821d1689377aa63035960ea8592074e6ecce9eca90e446e6253ff68529c0bdd401f986c91b0871cd2726f5fe0b0392cda45dc6166de833d190019f0"}, {0xdd, 0x90, "fcc9fe6a850520e83b150626598ba990972f7776150a4948f46cf8f82ace3a6d83ce3ee372648d12f0ea5bb752dd04202757b86da7ff3f5645081f3093086d116781e6e4d824dd659ff0b5180f3e7cb6d14b8593c1959b399233d244516a9429245fd2300ece9863475dec1f80f9ca6b6aac202928a058cb00855cdd3988444387641ba70e5a39fb0a3e311a08a16eca"}, {0xdd, 0x49, "7dbd2d71fdd71f165b4d3f6bef6c4d21031a6e5ab08bc47d8de562962ddc0a31414dd651051bb441a1b6bd0fbc31fc5356cb695dbe41f9b9f7769b50917938fa0104a518de8766679e"}, {0xdd, 0xca, "9975fc0bfaf5645fa845eab4a7bc8ea2d9ce0053eef6d9909791056682f14e78141a91528e5c4c56fa5082d4e13d65e872b19b6eecb7d40467731363d567deebd0987241f7cc83b8867ef5cb758eb4bf08243437ee2f4f868a0f5ba5a0dced1fbb2c685ab850220500ac78dea0a0f0d4b33feccc6ad034f187e0b2916564c5ff2055a7337214a31e3157347243c8f4197cbd79dccd5bc7bb775c110e43dbde21c61bae0227463cc420f405755ef3ac77188f621d27ee4cd8d772b6753c15830a8bf0c1740adcbc16e4d1"}, {0xdd, 0x89, "b25bd44dd7e3e7fd0fcb06bcee04499e54afe00b021e510b3273090966cd0e81ca9e9bcb3ccccf58f6465cce438b62c66511ccfecd267daa27d67caa20acd2f4cf72b6c9ae31f731632873fa2a43bbd1a8e2b549d3e483165a24f2c78449829c36298080fe47bb2ffacd81cd0992c314df53e81daad36cd7802f7f676bcd744e5af9e63a3e655c2da1"}]}}, @NL80211_ATTR_IE={0x13, 0x2a, [@ext_channel_switch={0x3c, 0x4}, @mesh_config={0x71, 0x7}]}, @NL80211_ATTR_BEACON_HEAD={0x492, 0xe, {@wo_ht={{}, {}, @broadcast, @broadcast}, 0x0, @default, 0x0, @void, @val={0x1, 0x8, [{}, {}, {}, {}, {}, {}, {}, {}]}, @void, @val={0x4, 0x6}, @val={0x6, 0x2}, @void, @val={0x25, 0x3}, @void, @val={0x3c, 0x4}, @val={0x2d, 0x1a}, @void, @val={0x71, 0x7}, @val={0x76, 0x6}, [{0xdd, 0xd3, "71854d80622b8b07b41d82b1bbef715fcc5893ea80f7ee7da5d5a109ba7c07873905fecd44dda67bc8030846254f134a12b0a60f5845f7b590db8a46b4d7f611227e4cab93ccf526cf4e2989ee4c7d2eb288d34ffb48f9432eb3a0c63b7c234e418d2e7bc27a05faad51cd6f229377b4d77221b38de870d7fab12c603be6d37a9f899818fa6e8a42318987026d241d3583bed9c2ab3da6dbc55db44f163ab1171d5366be65c4945ece3bfd9c8de5116e54cb9f266a6b755cd26bd30cd932758a319df634ab9a726da0eb14d7e43d310c913b22"}, {0xdd, 0x79, "476bf07a03457e409f11025ca05366c7c5d2479c0a27f9917ff40e3fd0d7a9599634804228893fdfa6020309156371144a79d447460d89feb261c1e7cc43cc2fdd03d0dced072c4e294d3543acc98bf7ed9795499bca4701020134e21af499ec0bf395a327d1df44695e0235f820bbe28401445386d250c3b9"}, {0xdd, 0x5b, "f22a5ec30e5c3343f495f0c228144d932c0e27941c4d0c64bac1fa75dd456510c1401b815304b955226da261a20909dc98f2a139127e52bf9c64ba80cc85f7f2261fb152fa4d09f412c2b39d097f8b27924a3f434baca997c9bebc"}, {0xdd, 0x7f, "4f67b2b7506547a2706cb5ae5ef8e99f0bf1fe63a47ae1dd069670905fd3d3b7681b9e973d20c269328e79e40bfc161c787c6530dfc462d8abf136430f5c1e8d1b94208a209dac2fdbb061c579cb9c05c691295c7662ce803d879bcdd77e7bd1b47b96812e9c9a89fbdcfb1d05c513af2d27c7e46d0a83702e2a692051a701"}, {0xdd, 0x1f, "2c16a249a03a751f302ae79ec54574bc5a89b1210b9653bec12779982a9f58"}, {0xdd, 0xbf, "d82b8eb711487525c8d1ea2b9f8efb5556eacac27ab5f4b0856121f46ce07eac051512c123ad6e743e02fd174b63de061dc1fc1b07c19b48bdb6acb4b9afecf03798eea35adc06503cb091ef04439db9eca678c99b337d010e31ccbc075e768e9339867a604a5e043ae0ea0e9a7de275315660f5f43ddcd741d5acc1112ca58c4b1551dc8e32f6ab76334d734001339905c762f3f2b991e608283199da513f116e859f273560404c7dc1733ce08152864fb4fb7b6bd84cefaa8a39f0d066b8"}, {0xdd, 0xeb, "bfa0eb119374004d09ad6faab0411ba10a3b740fb3df5a37d1a4ea4fdf18edb57674ea316fe861f1b80415719393dd681ce8d780472abb6693d485449404e347568cd97b4800071f9b2da96e1ef09b22a463fe5855fe247a32ab136bd1c78433ee9a9e67bd21ffaeaf563719a909a4f3ada70abe78b576400331fa665777f228b592be2f937a8c2615aee9b2d0a7d3bc9a32f6e0af5613f5cad26af76efb7cfa02ab0d90c86dc33645194f346d9d22af8793de1a0c597a18254f1f5cbdfef6855a1a4a16ab7e39e4dfb59da91f47c65d93a49c2a97b12c43b944656620e5eb00146ce8057c448312a7bdc0"}, {0xdd, 0x1d, "54ba3249bfff1efde84acec3a39239a3ec97576ce82086abe7942945e2"}]}}], @NL80211_ATTR_CSA_C_OFF_BEACON={0x12, 0xba, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @beacon_params=[@NL80211_ATTR_IE_PROBE_RESP={0x81, 0x7f, [@channel_switch={0x25, 0x3}, @channel_switch={0x25, 0x3}, @random={0x0, 0x42, "1cc408880fc900677f96642f4c52442d23c73be95f543b8678ee54ef0999fdbf085080570c13b6c66d6a693aa8d26174ab7b6c067727fd216960654cc4e647bd7d61"}, @challenge={0x10, 0x1}, @mesh_chsw={0x76, 0x6}, @gcr_ga={0xbd, 0x6, @broadcast}, @ht={0x2d, 0x1a}]}, @NL80211_ATTR_FTM_RESPONDER={0x44, 0x10e, 0x0, 0x1, [@NL80211_FTM_RESP_ATTR_CIVICLOC={0x3f, 0x3, "71885c15715f8558f82d08182695474673fca747b5c4d1fdf65bd4fce70d0a2f9c6061ef447c78c382a66df241b8bc5f55eabb4b672c0502cfe528"}]}], @NL80211_ATTR_CSA_C_OFF_PRESP={0x6, 0xbb, [0x0]}, @beacon_params=[@NL80211_ATTR_IE_PROBE_RESP={0x1be, 0x7f, [@prep={0x83, 0x1f, @not_ext={{}, 0x0, 0x0, @broadcast}}, @chsw_timing={0x68, 0x4}, @perr={0x84, 0xfb, {0x0, 0xf, [@ext={{}, @broadcast, 0x0, @broadcast}, @ext={{}, @broadcast}, @not_ext={{}, @broadcast}, @not_ext={{}, @broadcast}, @ext={{}, @device_a, 0x0, @device_b}, @ext={{}, @broadcast}, @not_ext, @ext={{}, @device_b}, @ext={{}, @broadcast}, @not_ext, @ext, @ext, @not_ext={{}, @device_b}, @not_ext, @ext={{}, @broadcast}]}}, @ht={0x2d, 0x1a}, @prep={0x83, 0x1f, @not_ext={{}, 0x0, 0x0, @broadcast, 0x0, "", 0x0, 0x0, @device_b}}, @preq={0x82, 0x57, @ext={{}, 0x0, 0x0, 0x0, @device_a, 0x0, @broadcast, 0x0, 0x0, 0x5, [{{}, @broadcast}, {{}, @device_b}, {}, {}, {{}, @device_b}]}}]}, @NL80211_ATTR_BEACON_TAIL={0x3c, 0xf, [@peer_mgmt={0x75, 0x14, {0x0, 0x0, @void, @void, @val="d7cc2944f716278a117ef7e631d6c67f"}}, @mesh_chsw={0x76, 0x6}, @mic={0x8c, 0x18, {0x0, "27b31df6df3e", @long="d79b65fedd5c026f6248a72286c69387"}}]}], @beacon_params=[@NL80211_ATTR_IE_PROBE_RESP={0xc, 0x7f, [@cf={0x4, 0x6}]}, @NL80211_ATTR_IE_ASSOC_RESP={0x36, 0x80, [@preq={0x82, 0x30, @not_ext={{}, 0x0, 0x0, 0x0, @device_a, 0x0, "", 0x0, 0x0, 0x2, [{{}, @broadcast}, {}]}}]}]]}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8}]}, 0x2c4c}}, 0x0) 07:00:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000009800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2023, 0x0) 07:00:20 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8007820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:20 executing program 4: socketpair(0x10, 0x3, 0x80000024, &(0x7f0000000000)) 07:00:20 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174680404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2105.045730][ T4655] netlink: 3260 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2105.055681][ T4657] loop5: detected capacity change from 0 to 255 [ 2105.066660][ T4657] FAT-fs (loop5): count of clusters too big (31457278) [ 2105.073639][ T4657] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=""/82, 0x52}}], 0x1, 0x40002020, &(0x7f0000003480)={0x0, 0x989680}) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB='7'], 0x14}}, 0x0) 07:00:20 executing program 4: socketpair(0x26, 0x5, 0x9, 0x0) 07:00:20 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4) 07:00:20 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661746c0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:20 executing program 0: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000198000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/sockstat6\x00') shmget$private(0x0, 0x3000, 0x0, &(0x7f00008c1000/0x3000)=nil) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) [ 2105.087886][ T4662] netlink: 3260 bytes leftover after parsing attributes in process `syz-executor.0'. 07:00:21 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174740404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:21 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8007a20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:21 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 07:00:21 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:21 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRES16=r0, @ANYRES16=r0, @ANYBLOB="4ac693cbd8b9f0d03511cfaecad07a6ada9e150550ed34c35713588a835432aca4a7468f8e3a5d74a89c149dab576d2a9aba606e1af031dd1da892b464f30d28f65bf014fc8440b85750ecb32df18da37a0a9438a98872f7b01389398d78c68e029fbf8f7e05beb7e0132412eab1af595ca727db699c856bf8c8fd253deeea2bee", @ANYRES64=r0, @ANYRESOCT, @ANYRESOCT=r0, @ANYRESDEC=r0], 0x158}, 0x1, 0x0, 0x0, 0xc811}, 0x4c0c4) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r1, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:21 executing program 2: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 07:00:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) shmctl$IPC_RMID(0x0, 0x0) 07:00:21 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174780404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:21 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:21 executing program 0: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 2105.993336][ T4694] loop5: detected capacity change from 0 to 255 [ 2106.007806][ T4694] FAT-fs (loop5): count of clusters too big (31981566) [ 2106.014847][ T4694] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:21 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\"\x00'}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 07:00:21 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8278520004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:21 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661747a0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:21 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) 07:00:21 executing program 0: timer_create(0x7, 0x0, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) [ 2106.136111][ T4727] loop5: detected capacity change from 0 to 255 [ 2106.162384][ T4727] FAT-fs (loop5): count of clusters too big (34905086) [ 2106.169291][ T4727] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:22 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:22 executing program 0: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYRESDEC=0x0], 0x8, 0x0) 07:00:22 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174fe0404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:22 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) 07:00:22 executing program 1: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003700)=[{{&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000100)=""/245, 0xf5}, {&(0x7f0000000200)=""/63, 0x3f}, {&(0x7f0000000240)=""/31, 0x1f}, {&(0x7f0000000280)=""/254, 0xfe}, {&(0x7f0000000380)=""/189, 0xbd}, {&(0x7f0000000440)=""/56, 0x38}], 0x6, &(0x7f0000000500)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f00000005c0)=@abs, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/203, 0xcb}, {&(0x7f0000001740)=""/94, 0x5e}, {&(0x7f00000017c0)=""/131, 0x83}, {&(0x7f0000001880)=""/128, 0x80}, {&(0x7f0000001900)=""/85, 0x55}, {&(0x7f0000001980)=""/60, 0x3c}, {&(0x7f00000019c0)=""/85, 0x55}], 0x8, &(0x7f0000001ac0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}}, {{&(0x7f0000001b00), 0x6e, &(0x7f0000001e00)=[{&(0x7f0000001b80)=""/69, 0x45}, {&(0x7f0000001c00)}, {&(0x7f0000001c40)=""/190, 0xbe}, {&(0x7f0000001d00)=""/200, 0xc8}], 0x4, &(0x7f0000001e40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}}, {{&(0x7f0000001f40), 0x6e, &(0x7f00000020c0)=[{&(0x7f0000001fc0)}, {&(0x7f0000002000)=""/110, 0x6e}, {&(0x7f0000002080)=""/15, 0xf}], 0x3, &(0x7f0000002100)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{0x0, 0x0, &(0x7f0000002180)=[{&(0x7f0000002140)=""/13, 0xd}], 0x1, &(0x7f00000021c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000002200), 0x6e, &(0x7f0000002440)=[{&(0x7f0000002280)=""/20, 0x14}, {&(0x7f00000022c0)=""/48, 0x30}, {&(0x7f0000002300)=""/113, 0x71}, {&(0x7f0000002380)=""/190, 0xbe}], 0x4}}, {{&(0x7f0000002480), 0x6e, &(0x7f0000003600)=[{&(0x7f0000002500)=""/4096, 0x1000}, {&(0x7f0000003500)=""/252, 0xfc}], 0x2, &(0x7f0000003640)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa0}}], 0x7, 0x12000, &(0x7f00000038c0)={0x77359400}) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000003900)={0x7}, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_io_uring_complete(0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000000)={@multicast1, @local, 0x0, 0x5, [@multicast1, @broadcast, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x34}]}, 0x24) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = syz_io_uring_complete(0x0) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000040)={0x2, 0x5}, 0x4) recvfrom(r1, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:22 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8278820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:22 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0x18, 0x2}, 0xc) 07:00:22 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) dup2(0xffffffffffffffff, r0) 07:00:22 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) 07:00:22 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000504090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:22 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) dup2(0xffffffffffffffff, r0) 07:00:22 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) [ 2106.895517][ T4751] loop5: detected capacity change from 0 to 255 [ 2106.915099][ T4751] FAT-fs (loop5): count of clusters too big (35691518) [ 2106.922015][ T4751] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:22 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000840)={0x0, 0x0, 0x0}, 0x0) 07:00:22 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000604090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:22 executing program 0: mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 07:00:22 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8038a20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2107.061323][ T4782] loop5: detected capacity change from 0 to 255 [ 2107.073124][ T4782] FAT-fs (loop5): count of clusters too big (36178942) [ 2107.080056][ T4782] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) sendto$inet6(r2, &(0x7f0000000000)="8ba62325793988c5fc165784a5e94050b3db8bd6e213fb46a31f26b9c20a84662c5625c62ad3f27b61dfde98413d4c10e74b543a025cf133e00d5b6b595017bd31", 0x41, 0x4040800, &(0x7f0000000080)={0xa, 0x4e21, 0x401, @mcast2, 0x100}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:23 executing program 2: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) 07:00:23 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) dup2(0xffffffffffffffff, r0) 07:00:23 executing program 0: mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4) 07:00:23 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000704090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:23 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8038b20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:23 executing program 0: shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000040)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) 07:00:23 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000904090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:23 executing program 2: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) 07:00:23 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) [ 2107.836012][ T4802] loop5: detected capacity change from 0 to 255 [ 2107.873324][ T4802] FAT-fs (loop5): count of clusters too big (36441086) 07:00:23 executing program 2: ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) 07:00:23 executing program 0: mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 2107.880225][ T4802] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @private=0xa010101}, 0x10) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:23 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000a04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:23 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:23 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) 07:00:23 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8019e20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:23 executing program 0: mlock(&(0x7f0000ff8000/0x8000)=nil, 0x8000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 07:00:23 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:23 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000b04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:23 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) 07:00:23 executing program 0: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)=@abs, 0x8) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) 07:00:23 executing program 4: ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, 0xffffffffffffffff) 07:00:23 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) [ 2108.031383][ T4834] loop5: detected capacity change from 0 to 255 [ 2108.060588][ T4834] FAT-fs (loop5): count of clusters too big (41419774) [ 2108.067490][ T4834] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x2) getsockopt$inet_buf(r1, 0x0, 0x28, &(0x7f0000000000)=""/205, &(0x7f0000000100)=0xcd) close(r0) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x26004800, &(0x7f0000b63fe4)={0xa, 0x4e24, 0x2000, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x4000)=nil, 0x4000}, &(0x7f0000000180)=0x10) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:24 executing program 0: mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 07:00:24 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000c04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:24 executing program 4: ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, 0xffffffffffffffff) 07:00:24 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) 07:00:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8039e20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:24 executing program 4: ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, 0xffffffffffffffff) 07:00:24 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) 07:00:24 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000d04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:24 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000180)) 07:00:24 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) [ 2108.884225][ T4865] loop5: detected capacity change from 0 to 255 [ 2108.914776][ T4865] FAT-fs (loop5): count of clusters too big (41421822) [ 2108.921664][ T4865] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:24 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:25 executing program 1: restart_syscall() close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_dev$evdev(&(0x7f0000000140), 0x2, 0x90002) preadv(r0, &(0x7f00000017c0)=[{&(0x7f00000013c0)=""/151, 0x97}, {&(0x7f0000001480)=""/45, 0x2d}, {&(0x7f00000014c0)=""/201, 0xc9}, {&(0x7f00000015c0)=""/207, 0xcf}, {&(0x7f00000016c0)=""/164, 0xa4}, {&(0x7f0000001780)=""/47, 0x2f}], 0x6, 0xe09, 0x11) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x26008041, &(0x7f0000000000)={0xa, 0x4, 0x0, @loopback, 0x61a}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000001340)=[{&(0x7f0000000040)=""/142, 0x8e}, {&(0x7f0000000100)=""/54, 0x36}, {&(0x7f0000000140)}, {&(0x7f0000000180)=""/57, 0x39}, {&(0x7f00000001c0)=""/142, 0x8e}, {&(0x7f0000000280)=""/109, 0x6d}, {&(0x7f0000000300)=""/32, 0x20}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x8, 0x800, 0x3) recvfrom(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:25 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, 0x0) 07:00:25 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000e04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:25 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800fb20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:25 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:25 executing program 0: mprotect(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x1) 07:00:25 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, 0x0) 07:00:25 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000180)="5789ede257975b201ba9735898d5ba6d76250ae6bd3ac54b942c0765b5186fb586988e9087425896c875338eddfee08e782818b3110d14bf17ad451ed48a071cfef31e09971c857091797b33873e450da9b6547a62590c141f39c49708571ec294f3213eb55719de2f111963a87293176c15ba6f512220099024d34bee1120c56d9c77d40e634b10d38128b708a9cf1ff3", 0x91, 0x0, 0x0, 0x0) 07:00:25 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:25 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) recvfrom(r2, 0x0, 0x0, 0x21, 0x0, 0x0) r3 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) setsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000000)=0x1ff, 0x4) 07:00:25 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000f04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2109.788447][ T4906] loop5: detected capacity change from 0 to 255 [ 2109.819025][ T4906] FAT-fs (loop5): count of clusters too big (65798142) [ 2109.825901][ T4906] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:25 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:25 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, 0x0) 07:00:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000440)={0x14, r1, 0xd73c68117b2d27ff}, 0x14}}, 0x0) 07:00:25 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800fe20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:25 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:25 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r1, 0x208200) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) read(r2, &(0x7f0000000180)=""/19, 0xfffffe47) 07:00:25 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174011004090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:25 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) [ 2109.939820][ T4930] loop5: detected capacity change from 0 to 255 [ 2109.953188][ T4930] FAT-fs (loop5): count of clusters too big (66584574) [ 2109.960076][ T4930] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:25 executing program 2: io_setup(0x60, &(0x7f00000000c0)) io_setup(0x1ff, &(0x7f00000001c0)=0x0) io_setup(0x2, &(0x7f0000000040)) io_destroy(r0) io_setup(0xd, &(0x7f0000000000)) io_setup(0x8, &(0x7f0000000100)=0x0) io_destroy(r1) 07:00:25 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174001104090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8fffe20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:26 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:26 executing program 0: r0 = gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) getpgid(r0) 07:00:26 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174001204090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000000)={r1, 0x7f, 0xffffffffffff8001, 0x1ff}) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @local}, 0x5ff}, 0x1c) 07:00:26 executing program 2: prctl$PR_SET_PDEATHSIG(0x3a, 0x41) 07:00:26 executing program 2: r0 = openat$vga_arbiter(0xffffff9c, &(0x7f0000000000), 0x161201, 0x0) write$vga_arbiter(r0, 0x0, 0xc) 07:00:26 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174001f04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:26 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000000c0)={'raw\x00'}, &(0x7f0000000140)=0x54) [ 2110.768602][ T4969] loop5: detected capacity change from 0 to 255 [ 2110.803229][ T4969] FAT-fs (loop5): count of clusters too big (66845694) [ 2110.810140][ T4969] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:26 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:26 executing program 2: timer_create(0x0, 0x0, &(0x7f0000000240)) timer_create(0x3, 0x0, &(0x7f00000002c0)) 07:00:26 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800ff20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:26 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174006404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:26 executing program 0: r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:00:26 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174006f04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2110.895649][ T4992] loop5: detected capacity change from 0 to 255 [ 2110.906620][ T4992] FAT-fs (loop5): count of clusters too big (66846718) [ 2110.913601][ T4992] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='cpuset\x00') ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 07:00:27 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:27 executing program 2: clock_adjtime(0x0, &(0x7f0000000000)={0x3a, 0x0, 0x0, 0x0, 0x0, 0xb}) 07:00:27 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000204090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80fff20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:27 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:pinentry_exec_t:s0\x00', 0x25) 07:00:27 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) 07:00:27 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000304090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2111.673632][ T5022] loop5: detected capacity change from 0 to 255 [ 2111.686973][ T5022] FAT-fs (loop5): count of clusters too big (66862078) [ 2111.693851][ T5022] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 07:00:27 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, r0) [ 2111.706310][ T25] audit: type=1401 audit(3628306827.242:302): op=security_bounded_transition seresult=denied oldcontext=system_u:system_r:kernel_t:s0 newcontext=system_u:object_r:pinentry_exec_t:s0 07:00:27 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x2, 0x0, 0x800}}) 07:00:27 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000504090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2112.026995][ T5046] rtc_cmos 00:00: Alarms can be up to one day in the future 07:00:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) preadv(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/88, 0x58}, {&(0x7f0000000080)=""/29, 0x1d}, {&(0x7f00000000c0)=""/150, 0x96}, {&(0x7f0000000180)=""/255, 0xff}, {&(0x7f0000000280)=""/17, 0x11}], 0x5, 0x3, 0x800) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:28 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8feff20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 07:00:28 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) dup2(0xffffffffffffffff, r0) 07:00:28 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000604090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:28 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {}, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4}) 07:00:28 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) dup2(0xffffffffffffffff, r0) 07:00:28 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000704090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:28 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mlockall(0x3) r1 = shmget$private(0x0, 0x400000, 0x0, &(0x7f000000e000/0x400000)=nil) shmat(r1, &(0x7f0000ffd000/0x1000)=nil, 0x5000) syz_io_uring_setup(0x2de7, &(0x7f0000001600), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000100), &(0x7f0000000000)) 07:00:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 07:00:28 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) dup2(0xffffffffffffffff, r0) 07:00:28 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000804090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2112.589660][ T5062] loop5: detected capacity change from 0 to 255 [ 2112.625816][ T5062] FAT-fs (loop5): count of clusters too big (67106814) [ 2112.632722][ T5062] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:28 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, 0xffffffffffffffff) 07:00:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xf8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) 07:00:28 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000904090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:28 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000040004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req3={0x9, 0x600, 0x9, 0x3f, 0x4, 0x8001, 0x8}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000b63fe4)={0xa, 0x0, 0x800003, @empty}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) unshare(0x2c020400) msgget$private(0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) 07:00:29 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000a04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x442002, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x5, 0x8, 0x1f, 0x1ff, 0x8, 0xc28, 0x8}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:29 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, 0xffffffffffffffff) 07:00:29 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000b04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:29 executing program 0: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x4000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=[0xffffffffffffffff], 0x1}, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0xf0ffffff) 07:00:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x5, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000880)=ANY=[@ANYBLOB, @ANYRESDEC], 0x1000001bd) recvmmsg(r0, &(0x7f0000002d40)=[{{&(0x7f0000000080)=@alg, 0x80, &(0x7f0000001b00)=[{&(0x7f0000000340)=""/156, 0x9c}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/90, 0x5a}, {&(0x7f0000000400)=""/184, 0xb8}, {&(0x7f0000000280)=""/119, 0x77}, {&(0x7f0000000640)=""/212, 0xd4}, {&(0x7f0000001a00)=""/70, 0x46}, {&(0x7f0000001a80)=""/86, 0x56}], 0x8, &(0x7f0000000500)=""/61, 0x94}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000001b80)=""/4096, 0xffffffffffffff37}, {&(0x7f00000004c0)=""/43, 0x2f}, {&(0x7f0000002b80)=""/139, 0x97}], 0x3, &(0x7f0000002c40)=""/227, 0xe3}}], 0x2, 0x0, 0x0) [ 2113.485387][ T5097] loop5: detected capacity change from 0 to 255 [ 2113.525020][ T5097] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:29 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r1, 0xffffffffffffffff) 07:00:29 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000c04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:29 executing program 0: r0 = socket(0x1, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000140)) 07:00:29 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000060004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2113.562176][ T5097] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2450/file0 supports timestamps until 2107 (0x10391447e) 07:00:29 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000d04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:29 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x2160, &(0x7f00000060c0)) 07:00:29 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x40000140, &(0x7f00000060c0)) [ 2113.685010][ T5135] loop5: detected capacity change from 0 to 255 [ 2113.696385][ T5135] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2113.714738][ T5135] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2451/file0 supports timestamps until 2107 (0x10391447e) 07:00:29 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000e04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:29 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x26902, 0x0) write$cgroup_type(r0, 0x0, 0x0) 07:00:29 executing program 4: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) read$char_usb(r0, &(0x7f00000004c0)=""/73, 0x49) 07:00:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a0000000000e7ffff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000"], 0x90) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)) 07:00:30 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000000)) 07:00:30 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800000a004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x101002, 0x0) write$binfmt_script(r0, 0x0, 0x0) 07:00:30 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 07:00:30 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000f04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:30 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174001004090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:30 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) close(r0) 07:00:30 executing program 4: pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4) readv(r0, &(0x7f0000000640)=[{&(0x7f0000000540)=""/200, 0xc8}], 0x1) [ 2114.556413][ T5164] loop5: detected capacity change from 0 to 255 [ 2114.570055][ T5164] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:30 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174001104090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:30 executing program 4: writev(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000000000)="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"}, {&(0x7f0000001000)="b85685351bd66a7089f266cd7e96374269caa25f82731f94c4350241701e3f748279c5f48d310695dbf08854df3e4070deb2e793dcc558b4888fd0e101f68788d8f7832fa46244b22bdc050ef9af78a59b16af3ec239d6bed2454b3e366a57af685ef7b59460bf53bada416820832e08bb7854ec6393f3a2512b4fc78058b1c881da86c576041f198e8f11b6c4e06092e62479d84589e5b99778886bf5f45319af5224869d7309773ddfbace9915b7e90ff2e9817a30aef567549df87f375b7eb771fe772d1bfde6640fb155c61ef9945575d6f101e4d8"}, {&(0x7f0000001100)="c8d0ff704fdba5205c4c39067ac0bcade00b4630e01c25a63d7d357d692ed5861a7a98de1d7f0ec48a5c8593593166b719a3da9790c5b097a54519b77b9ae090d740a2a30478d07b6cc4b0c54bbeca68f241f97680d1702a2f4c92d6af423cd24996ba"}, {&(0x7f0000001180)="a22df9a728af5c6f24824b5c59d10703a49e68156e74e31f36695a30ae983717d90ec30699bc5b9ccbf908a0be34c50adde465c824b9973b17654102d31549dd3ba0e05e0003c43ebd615b6ac16b21debf76f941312e91d092d7a9ea3d80be6a095f9efe5bbf1bd3cabff8855e10b15ce1cb8a805ac9927d5235cebf2312b9d37ed901d8e6a9cb"}], 0x1000005c) 07:00:30 executing program 2: r0 = socket(0x1, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) [ 2114.618922][ T5164] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2452/file0 supports timestamps until 2107 (0x10391447e) 07:00:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open_by_handle_at(r1, &(0x7f0000000100)=@ocfs2={0xffffffffffffff88, 0x1, {0x7f80, 0x3, 0xe9}}, 0x0) dup2(r1, r0) socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:30 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private0}}}, 0x108) 07:00:30 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174001204090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:30 executing program 4: socketpair(0x18, 0x2, 0x0, 0x0) 07:00:30 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800000c004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:30 executing program 2: poll(&(0x7f0000000000)=[{}], 0x1, 0x8001) 07:00:30 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) fcntl$setown(r0, 0x6, 0x0) 07:00:30 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174006404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:30 executing program 4: poll(0x0, 0x0, 0x8001) [ 2115.355800][ T5205] loop5: detected capacity change from 0 to 255 [ 2115.375055][ T5205] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:30 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174006f04090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:30 executing program 0: setitimer(0x0, &(0x7f0000000700)={{}, {0xc600000000000000}}, 0x0) 07:00:30 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800000f004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2115.401352][ T5205] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2453/file0 supports timestamps until 2107 (0x10391447e) [ 2115.501401][ T5231] loop5: detected capacity change from 0 to 255 [ 2115.512017][ T5231] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2115.521854][ T5231] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2454/file0 supports timestamps until 2107 (0x10391447e) 07:00:31 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvfrom(r3, 0x0, 0xff35, 0x61, 0x0, 0x22) 07:00:31 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000402090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:31 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 07:00:31 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000220004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:31 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000403090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:31 executing program 2: readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)=""/190, 0xfffffffffffffe79}, {&(0x7f0000000180)=""/145, 0x91}], 0x1000000000000099) 07:00:31 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[{0x58, 0x1, 0x0, "5a1e039d762e55a9c884212e5083a1b5f066c5e654413a6bd52f8db2039d53e87d46eaa213a7e0565943b99648d6a8a0527076b3b03a6e7229b09b7b63ff0bdd13"}, {0x90, 0x0, 0x0, "33b65780dc4275542fb593c2e2c1e5d640e54adfc5f7e33be1bc65713c6d4d7e3a9c7507974e5f7d588afaf7cb42e5da7a7c193530bb8391cb20e8242a087a7d2a7601161c857777a224d054f44010d3b0ef860de880199cb4ed88cecc04d9f53014a50640a3876f569c658a951f42ced3260692edc9da613d"}], 0xe8}, 0x0) [ 2116.214919][ T5245] loop5: detected capacity change from 0 to 255 [ 2116.226312][ T5245] FAT-fs (loop5): count of clusters too big (524286) [ 2116.233031][ T5245] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:31 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000320004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:31 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000001540)=[{0x0}], 0x1, 0x0, 0x0) 07:00:31 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000405090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:31 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f00000015c0)={0x0, 0x0, 0x0}, 0x0) 07:00:31 executing program 0: socket(0x0, 0x51b6cd993fd8fdc9, 0x0) [ 2116.335255][ T5266] loop5: detected capacity change from 0 to 255 [ 2116.363294][ T5266] FAT-fs (loop5): count of clusters too big (786430) [ 2116.370145][ T5266] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:32 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x8381, 0x0) write$P9_RMKNOD(r0, 0x0, 0xa) 07:00:32 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000406090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x40002001, 0x0) 07:00:32 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write$nbd(r0, 0x0, 0xee) 07:00:32 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000680)="24000000180003041dfffd946f6105000214010a1f0000050c1008000800080004001000", 0x24}], 0x1}, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r2, 0x6, 0x6, &(0x7f0000000100)=0x5, 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r3 = accept(r2, &(0x7f0000000140)=@sco, &(0x7f00000001c0)=0x80) write$binfmt_misc(r3, &(0x7f00000006c0)=ANY=[@ANYBLOB="73797a301ccedf9ad754d8f0ea3c208c7f01544863dda7f81296e2b2ee264593ad8ae7ac4afc9605e840d218ed3a6ce942a95a382864807b7c78cc7ece19e3062a4009f96d282611c69fa40ee316d300686ff69c180a29f88fc71030018313d29b461364e6590453f43a3f1fd9f9a5845a46b78d9c0b454a873300100013413638dff92730991d44fe64854fb5de5e92bc8ffdd214e6704861d4a8d951b6f679afb87e4f81330c26a5a18b8ddc13aafb470535246f040964d1de5714f1c3ca11da5968f9e37e988f079a3f3f742249e6d4f37ae915d10e13e643fa8cb9fa611adb081024faedf109e654b285bb396436c057dfc63ca6f1551d071a8585d0383c88712177c9880e7f407aadde110e2db8c4c4e75d71706d392dab5e1d75c43c354de56c62b74d4eccfdf83bfb91d0d00c12a7dd302fda6a2f1c313d1b2cc05a920bd277c61d5ef5df33ece4f469c5b1b5a04895625a64a60d473882d01129553ef0f31c1b0ad521d0cc964ddd8a1bd778f178b41aa48f7a2f90151600ec08b71dc286a86f49d99e0319fffbba88ad7098e277f933b015"], 0xfd) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000002c0)) r4 = syz_open_procfs(0x0, &(0x7f0000000300)='net/udplite6\x00') r5 = openat(r4, &(0x7f0000000200)='./file0\x00', 0x800, 0x43) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000240), &(0x7f0000000280)=0x14) sendto$inet(r4, &(0x7f0000000340)="2b45a13144685ed8f3873f0f641adf8fb1ef80cbca9ebd26bb3ce96d410a8dddaf626560031bc8f3bd78ac511145e83a174587b0b8bf21b0a34039b676ff0c9d52ca0660963525e985d4c2244a4ddf0efee3769940bd32148a04369d12a15de7f72e512af9de2296b7b57424e6af306e96fcfe39ed25f81d87d451f8095f45dd934fc07342ec0eb9e71ec959651ef61f8b62777a7094fd0003d1c2fc39eb8821e0c4146e11c8d0d0a778f813ac16", 0xae, 0x20008014, &(0x7f0000000400)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x30}}, 0x10) recvfrom(r2, 0x0, 0x0, 0x10000, 0x0, 0xfffffffffffffddd) ioctl$IOC_PR_PREEMPT(0xffffffffffffffff, 0x401870cb, &(0x7f0000000040)={0x80000001, 0x20, 0x6, 0x7}) 07:00:32 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000420004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:32 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000407090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:32 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x201, 0x0) write$cgroup_int(r0, 0x0, 0x2f) 07:00:32 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x2e, 0x0, 0x0) 07:00:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 07:00:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x5450, 0x0) [ 2117.130748][ T5295] loop5: detected capacity change from 0 to 255 [ 2117.150496][ T5295] FAT-fs (loop5): count of clusters too big (1048574) [ 2117.157278][ T5295] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:32 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000408090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:32 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGABS20(r0, 0x5451, 0x0) 07:00:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000002480), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000300)=[0x0, 0x7fffffff]) 07:00:32 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000520004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:32 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000409090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2117.309237][ T5323] loop5: detected capacity change from 0 to 255 [ 2117.321304][ T5323] FAT-fs (loop5): count of clusters too big (1310718) [ 2117.328092][ T5323] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000400), 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x5421, 0xfffffffffffffffd) 07:00:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000040)={0x0, 0x0, 0x9, {0x9, 0x1}, {0x0, 0x3}, @ramp={0x5, 0x4, {0x2, 0x0, 0x1, 0x80}}}) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, 0x0) 07:00:33 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040a090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:33 executing program 4: syz_open_dev$evdev(&(0x7f0000000080), 0xfffffffffffffffe, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x4020940d, &(0x7f0000000280)=[0x3]) 07:00:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open_by_handle_at(r1, &(0x7f0000000140)=@FILEID_BTRFS_WITHOUT_PARENT={0x28, 0x4e, {0x0, 0x81, 0xf2c, 0x9, 0x3f, 0x200}}, 0x0) splice(0xffffffffffffffff, &(0x7f0000000000)=0x6, r1, &(0x7f0000000040)=0x2, 0x6, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x1e, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='net/kcm\x00') recvfrom(r3, 0x0, 0x0, 0x10000, 0x0, 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x1c) 07:00:33 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000620004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@generic={0x0, "c0b90047867f38f513d74468d02b55f22e5cabee39553cd0757c941e31b46765eb676d1d41ed788fe7ca984696a246011108633e08a0df5e76d85fcf2f9e4032ed427d5dbe113b8d1470570409a66aa5569341bb14a55764cee4290b8fb8e359543ee9b93dce9674e6d62d0f0959e6df99497fe4c6d717666ed5fb5bfc37"}, 0x80) 07:00:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req3={0x10001, 0x1ff, 0x5a8, 0x3, 0x2, 0x9, 0x100}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004005, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @mcast1}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:33 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040b090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:33 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x3e, 0x0, 0x0) 07:00:33 executing program 0: clock_adjtime(0xe05ef8fb, &(0x7f0000000000)) [ 2118.073862][ T5340] loop5: detected capacity change from 0 to 255 [ 2118.095174][ T5340] FAT-fs (loop5): count of clusters too big (1572862) [ 2118.101971][ T5340] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:33 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040c090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:33 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80) 07:00:33 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000720004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x58, 0x0, 0x0, 0x0, 0x0, {}, [{{0x8}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}]}}]}, 0xffffffffffffff70}}, 0x0) 07:00:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084503, &(0x7f0000000140)=[0xfa]) 07:00:33 executing program 2: syz_mount_image$nfs(&(0x7f0000001a00), 0x0, 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000003080)) 07:00:33 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040d090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:33 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_matches\x00') [ 2118.262780][ T5372] loop5: detected capacity change from 0 to 255 [ 2118.281023][ T5372] FAT-fs (loop5): count of clusters too big (1835006) [ 2118.287828][ T5372] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000140)={&(0x7f0000000040)=""/222, 0xde, 0xfffffff9, 0xff}) 07:00:34 executing program 2: socket$inet6(0xa, 0x3, 0x80) 07:00:34 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040e090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, 0x0) 07:00:34 executing program 4: syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000640), 0x2089000, &(0x7f0000000700)) 07:00:34 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:34 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040f090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:34 executing program 0: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x7f}, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={[0x40]}, 0x8}) 07:00:34 executing program 4: mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 07:00:34 executing program 0: syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x1806000, &(0x7f0000000300)) [ 2119.084782][ T5396] loop5: detected capacity change from 0 to 255 [ 2119.119537][ T5396] FAT-fs (loop5): count of clusters too big (2097150) [ 2119.126342][ T5396] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000080)="480000001500197f09004b0101048c590188ffffcf5d3474ff9212e10520613057fff7e07900e0413ff26bb452cf9e8a62bf5b3b8c3cfe5f0028213ee22600d4ff5bffff9b226452", 0x48}], 0x1) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb", 0x8}], 0x1, 0x1) close(r3) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9}, 0x10) r4 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x0) sendfile(r4, r4, 0x0, 0x8080ffffff80) sendmsg$NL80211_CMD_TRIGGER_SCAN(r4, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000001980)={0x1464, 0x0, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_SCHED_SCAN_MATCH={0x10, 0x84, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @random="9cf282b35bbc"}]}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x8a3}, @NL80211_ATTR_SCAN_SUPP_RATES={0x1424, 0x7d, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x37, 0x0, "ebeb79b043d701745a9120de72cea73c2f51a21eff5f1941a288309abcc5f461130994168b0a22c14f39d480e85abd08ed3bdb"}, @NL80211_BAND_60GHZ={0x80, 0x2, "dd6816cf577c0be651d379e840c32b71b198967e5c89f22599832e31d2ebcfca00e607d3ae37dec0ed6dd097225af7ee87b3c7cde2c85a0dea321a7cbaa533c0520e871172588215b9b8d8c221c1cfc059b28e8300892d3380c5ab0c5f6aa0f5392d6bf3633310a7a2aa846969e7a8c1b8f2fdfccbdd259fc2b568d6"}, @NL80211_BAND_5GHZ={0x42, 0x1, "a33590d7eeb8600f69fc58c350f28a36fd04d4b7d0747fdd806192248212cb5083a19b46269e1e6d2bf8e2cd198e09ef36505648c6bc5e939fda7ece1f65"}, @NL80211_BAND_5GHZ={0x1004, 0x1, "a485beee6962459159f16d59b7939376b1bfd734e29072b7a3f230e5e6f5c2b6a6ff65917710d2beaf554c19f5fce17cea8cfdda4a266ba8607dd7e1d5268bc2544cf45106c3ffe2dd971f110b9664393c97999218833ed808a6216796dfe9fd2feb95beea9b6aff9216470f31047bbba49dc7f746a97db6987038dbacdd182973807b2b3a6b6cf64c767a4fbd89fdeae12e7873bec8d6c562daa13561a3617d522a0dc55a1f9f38739bf36170027dfb9e5f17c4cdfadee95532aff60b0940284760f8e6b9cfb3ee6c8b136a6775586e5b9c83159b1b165ab86e6441ab30a741e40a53526af1479ea471b6962fee28acfd0e0b8f846a87119948c17569fc9c7881372ac6a03e1cb28416d553e7c48a9de0f6a16312fbd18931d32828fc825dee5f16935ca084f821847a5ece1c14add6f20548871dbe474fd4bdf3d31ba598fa2d9e4f5e25774d3b3a5bf5575fc23e5343df0b4327525e240f123620d5daca5025b547dc6a19f79869298593363d1b194fd20a941d04dd0d87c2b003d526658ec438b45202686acdef6df1203669e505654ea21fb81953e9d4b48d49a73994e43cb5a760b481f34876fb711f91ea968616d5583e9745ee693959a2c710a7e03ee80b2fafe727f1cd7008f97cd8d3644d137a7a75a15e0274407a1324ddbff86e27137545365dead6b46bfce842345edbc2aab65fb1d4913cd7d1dda9fa62ffcf4ea79375f86c1349c98c45bd4047223c3b369f0054599b052b2e557989779c795640050a5f6bbe217bbc0a252cd03a2d62def313bd32a87a3350cae170b85ad4741073747f008c60dddead292472ee5eb68b31ee39a3456da18330f04ccb3fe2d802cd74a56de3b7167c6ceeb368517b10fcea2a6ddcd09a8b9a0e6b89f8f4c219b46382a5f0c28c63d3dca600b6a24f1ac113fe786e11cb4ac74ec646c22b3a5259a0a9e3b7fb3181f3c698df0c73d07bd548bfe3f259fcee976307fe7be8c672ac9343da024580808069d4cb8b6284dbb003755864dd8a3da9e4a55af1fcd7ce8ea6b5e00e544febbacad0addbaada9c9f87330e0d224cb055a15e8ba4b1b005cf6f117e500d04d7cb334dac775e9d2f666b6070d755687b798351c780706a9c331d59cf084808913f99bceee1e6f715d956a02575c67790e0fdb556d4121f38b5305e0405d14ceceae6fad0986458e3809ff7df071125a99e531726c0ea6f96e051d22c5556ca8377d717b4d7691fd87a65e06f77f6158b3ea569711157b091a3588aae66fe5515ea682b8036cee7c7613c8141ed3f964a56a7f84b98b1d0ee6a203875c6a94b263f1eae8984166f195d9cc8fc41dc0b44b7149c72a95c9886c3b2b2d9db8bc325742b99451a9438987d41b148b710cd4331843efa311927bd8f0306dec331cdf72fc91a0f40f6622671ad5ecf34f828047804720a42bfe68f44003bb40155994822753249222bc8855e0d07566dba465e7a9343f48cb646a95e16528761a4c67074f65c252bce83e517a9beb7d27d8883a464767be74f0d0b8b1f8cfd104c7ae38dc840e9b4afd4c9ee14e1339642a81eca93e05dcf68b30076f69864f250dbb2ee5c945e49fd25a535e0a62bc85b81f8d8f0608f5050bf60de84c54b2e9872d19564d13aab3eb98e85b616bd57e132a5e0cbd8e3da0a43f73ad6bc81cd4e1d75f780cc6a39f7675b205959dcbb344bcf572f6b7ac867ef71e7d24136dff9f287b1a6c805c4256c9570ed208fa976175d34e0b4913adcadedfcffe6a10a4473a11fd784f49d8134e8d08e7c74ef8e7b9446f610dc3a7a49bbc71a9016cb66791cca10e47e7d133abcd804e42e0efd4430ab2a74ad32e89e7419a2e70a9ced3ac7c74f5fce571191f7add46fb764ece26f541a504d21039c118bcd8acc0c2268434d74125125c1ecad92bf2d9a205dfdcf84eb54e49b65b5a339ff9332409b1a7452173f58bb6d971a6cd6666fba5acc5436402415ceb39959c28fb0ae74d0ecc19195de4275486698b67faa3b12a52953cf4abaa64ccb766fbfe4bb1b8ea4cd1c8bda9c704833edc49732b5c393f3f7bcc90ea68d55a98d48adf286af3285b7c2a76fe442e3e84069d7c742b82df584312c1a17d95c74b60feefb9b868dff8c01c56060ea6021a40f297d40d3e1a18eca4917231da66d6f9e090904421e3bb5bab3f47f95f3aa94a7588f16d2f2d6aa313067838dda169afd6e8bddbfb9d123b85c446f8e426b801bb5caea9f1b69306b4b054990e87ecf21fab3b332e832e311396f29914484290ebeea9cbec43526e047bf7f54100c5130adce732fefb9a51f45b635760f63eb14b1415600ec87fa9407950ccc0e0217f630bf5dc81480cb414a926550e35199b1038146832bfd5391250710c6928253f2b7437dba878c88b61c0f346f5621946584a017525e37c297b06c376cd9fc3363bb3096a7146ea5e6195d6cf08a7b4ec329531e4e0bb47e90b207ff3593a2491fed9c1370519fc61a95fe54c21716033cc604b8f367bfa46ccc9d443bf5a419dee6e5ff0d21fe16864a15825d140ec990f763e6bf77690b0dea1e6e48fde21c7b799ac6f6cbe55d5bd7f86c47b247ac0beb8f1a8736d02f579810d5aa6bf0587d1b9c6bf4e38f0b5042d0fae7111c67a0b07627a3c164c62907494c640c8d3ff1284f0067243e51f1f12b3efc684bc8293591fd822c33ea5049b964685fadd804b6994cf2ee264ec1e3666464dea0f9c5cb9f76c2b4f6ef1f5b9be087538062257e8d4e53a59441a106385936877f30e6b1e5de9d18845c0ca270f4cfd40bc5ce6417d357ed78ab14afefc4f2da70169f3a21a05002e0c2db263d723ba324d51152da01921ff7760f25914a747df93a009e98d725157af3966550a4a18e8e85c2208220469735dc3046690e8d6ee369b1119ba9920119badf95f1a3d806a25676827e1219452e2cb27ccf6051313e4bf343bc52f3eb50168a75eed2c8bb69579a068715a886c2d1f4b8f8fb36cc0fff81fa5b704c967259546765eda05481ba70aab5b945de761e7a1e86df3f0ea03497813f21f33dcf6f825874b91913024937b51251b75450ec4694b947a6d3e0c98ecea138675c1e919ac72df74ce3adc2f4787ed25ff49807298f842d240b7d8e210f1b4c1388cb748960858d6a42d8b0ddb52514cd57bda3a1c3d8e70333bf1f770fbb17bfdee70db3aabcbcd3f4f167475e97e9b4d1cd210d6e8b8d568c3dd5d893995d2d9072889c173657ddf7d0ebf2431c535fb29e310fa599c0fac323f30a6337d47e7d5acd8c9d7dd5e889a24724e1a843bd01a7ffd33d01e12d53556580c9a0cc1dcec3bfdfba7b04f3f37a5d3890572ca493b26aac88cab1e9debea61d9fbf7a7d682b2e9e92fc33f0dae5eee567f969914bacf9a36aeac202ae1e11b2d4907430afea8309988ccfdc212a1cae314736ecd89b2a477ac5bb6c60bf0d34c6d099878783a884576a63b2972b5de42a3a961cf6676fd46ac11508684a4d726aa02293c3bbc20f73dbe839b24a6eb77010827151d9bd66b49f81f5b50b02e56fb2a74101410ded5a284046b10bc4d6105cad05e52da9f01a0e209a73eeb732e7d5599daac1ed7da84e13e1d7ef625466e1ec02c1d1138fd4716cdf5c27b69dd822b96be30eaad37f9969950689f15821368fc2f6296e7d7c6270af59a041814582f8469ec3832511b03d85522966b85acb33eb1544d3e47004f082ed2e7afcd1687c421f8648d0fc2d6b3f786481c79fbf0511b3455c7407a189a2d34396ff81108c6aab058c8e950dc2c8a505949330e6aaba5fdc9c00d9f9de001a6c1e5f6b843b223dee25a0354c8e77d6b75914bcdc7920495978607d52a02fc296ad57409a872c8f50bcd73a5862698a23bbf72824e6000ae235e095521af7dae7e2f0f79103c040c15b16da6eb894f8ff42b8f7c069fb91ed88a2a6a1ce14267b99937749c30a2477c7701e115a034736e22fb1b9344e36b2ea7c01d5721e5f6611716fb2f474ce365a741461dbafb80c056cc2edef102887af6eab679d9d552500011339f56eaa03dd1939383565a1c0e7a0182e36ca13bfd1f1b19f07c9c22702f951b7f9c35e9ee0eb1bc8e1e753d921be1824c72ee05096ee6abc282e626c6fe4ff733e836b81d1f9f2dd8a12441a6878a8c5ce8d11aad9c98f763b161d0a855e34fd04787e1fbb567bddedd27a78a5aeb69729cfd4a89aae6be7366d367dd5f8d33659e14c77f80b5cb0427b15b07c1451a92cd2d988f426c1fc5b11879bd58f889d5595ea8debcd6c652f3c22f69514372d7edb5c6b08d6db96db1953063408889147f17e3a72df0d0a54653f835fc4ce0e65ba71944b3232331ac24e95a94cd0d34df709f8c15d58ea0f2569ce1e8181f123464e8b9c0f14965791babbf1741e692ef15236740a96ecae4fa819fc105dc13fdb9b53f4f72759d2a95359f3ce7672cce18b013d793fc581deb9247b68db3db9ba95722db55c87a83e0f0a76f9e0d18faa3d8b241688d3512eb754c5901b8e3635addafe4e5b638de3b3869cadfaa00b6c5194d0ea79cdfb8d3f84c3df2a68e91abc51042c5b6b60da00f574761633da48561d7897dbd626afd1b74474b8d9470d26a8ec00ade65216bfabb0fe25de14d7d86516893384c500161c2f06763257b571878dc5c64b654aa841550098734fbcca820c3e23690db2d0ad1bf0e401b2904bf79aef31ae3916fceddb9f5e553af50a2e6b868a959da4e5098dd171b6d457d93ed857b073e1e90c4cbe151385b26307aaa1777ecc2a5091fd73e9348865c0dfdad91bab6500d4ca42ac745a21cb645363c41309825d1adf3588a488aac00293757e3e4fb2e3e044ca96eb1acfb287f1efe741173837604a147639e6d0e2b832ecf9d07d2671a654b855d8ca11fde0398af3378691c82fa49b27b4dc306b1f2c2286828a8096bdb5417e1497232c47b89d3d1ff43d53b3b421b48c9bde62ba99ec0be2540305891b409c43e8f75cb38ef8a2dede37f99631272358c3f36b2682b12fa6ff6f9ae30b9c7a64037aabd5d42ddd09a2b31de0c24eef0c98c2422464653077255ad6442fa6a5ee263ee3fe084302f7a074294ec779022d498b28147dfe542d83e6a62540bb99156ec74cbfe5c50c45bcdfaf04dfa160f64392600ecf10817d0d59e57e56c505fb7b7c79e4fa51b9e62500cb40582a067a82c0db3df89f95f6472445abb089825978d5a2c9fa54d3d6295ed74daf634c18dd3d1501138dfefbd76ecaf21b3c8994a215c235efa6f68fbd2b7519c050c9b39a09ec99332e821b91593b1b8897699d26a911f620699cc6470b5f50e231a9595251dec1bae6539aa79d7b62bd2b1b955e2a889f45be0293b6a632bddde1d1b8d21e2c0a8d8c46fd426b1aac1dcdd41df9cf60bdbb529ca973fafcda68ce7ca5cdec946727d8593875038e1dd536c40640720a9841ddfd0c4e4c09a8fc741b5ec76e4b0aa6f444afddf28be8fa7877270b5e620079938787b149e6bc426fc10f48c67cbe46728ad390212a584535a2f969934e2b90db4ea5e61b0cb62b71b6eafd2d0dc4db9541ea945f17c72d34ca65d0bdb5e66b64251f8be4c82bb43d5af30f4c2d7b08d2ab83490a47e3996d78609d8fa11dabb5057dc702be5bef8f25be1c08d6a10fc8c1a2f4bd00405c6dc423d4666d40fcf8428b9dee741b50113cf247e7aba56c9ea8eb792beca41a781cc42904d9cfb1a1286ad2defdc5773364026541e3ba8c3f8e80ba284d867533ba9cc9d0ff669481c4cd8f0a9bbe474482"}, @NL80211_BAND_60GHZ={0xe4, 0x2, "42d4272a0ab8b21ce7e313c8f9344d0564f84e75c8b6423f8ac360e5a22da4844dc0511054d525e998b803552421da0248d322e6d689bc0f1ed13b1b7685e4b2a93a87f64c2cf258bcd4c58af39b50eb247c2d87ad02eca635413bbbabb8b290c15374ffbd603c5cd160dc28e02b1508de8ce15fbeaddf412f6114f0f8d132e5c091a805310a09e64e52c9ba5c0c124114186763f90f2685fa63bcf2fd9e702d2d3213d7ad811521f58ba03a96ecd1f3c9afe7a3c0fe596b63e846e3b0a466df91ee89afe29924a4d36ab4c8eab0a6f93f74d14a51789b076790f9023f05ec5d"}, @NL80211_BAND_2GHZ={0x4}, @NL80211_BAND_60GHZ={0xe9, 0x2, "9cb4c881d60d07a7cd910c25b8ebb8ba0c6c3cb92b28148aded475041284ad19b633c7f97afbc0bc504a0aca830805db0163e1456c5e7ad5f71960521ddebf894aa0466c1340acff06226fb2d2c0b935dca3fa8caa3f2ad31d2d5b9c6d5002b8a26ed975acd9418a52813eb3cbe0539fc5cd15fdcfc4547cdacd813ea0464d157ccbb5efeb8a08fe918c28a90612d58a08bdda4dd157d5a0b925c17ec3e45ac6668108578e664ecd4e28c6d721074a360a45f39e077b1db53761f2fd75c403319b02f4ffee183970fb46ae7732b6b3a11b6bef2007eaedb14ad3f22a8420639d64c51f1274"}, @NL80211_BAND_5GHZ={0xe2, 0x1, "a85a605b0ef67c081c32895a9ae4c5413564a7bbee3358fe9febf02a736e5b1f218b6d42736287e176f84211b307bb508b22812eaf674946158e0183a68ae43ccb0a7b3441374f52ad82f32695c1d462a1b21f5bc229445cf13015cbd7236b3b81aec643f9908dcea1c009665cb0772f284b73ebd2094d8d6ad4eaa6a857b9576c7253f94bc66d4743f1ecee4c79a85d9b8f371a5285cbe7a8898d52545b28f3cc5041282f4c7cd2192ee364ad87d7df88ce475ac76734b44346bb882b8d35c8b80498970fca04b17a6e780d4e61fec77a01f565b879a4c2bedc91341208"}, @NL80211_BAND_5GHZ={0x66, 0x1, "2d640297f8c1a827bee40feec9869b2326c30aac709e7b9a61bbba13f6652ad6a23a449be5773592a4298f0505c7ad9e6881471e2e7513008a6a3a3e766d905bc3d07ee9b6a1a6d25d84636e28cfb2f1079b9e45c887e6c157195b21e8c3312b17d5"}]}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_MAC={0xa}]}, 0x1464}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c011) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0xffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEV(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) r5 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f0000000400)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[0x0]) fcntl$dupfd(r0, 0x406, r5) 07:00:34 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000410090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:35 executing program 4: utimensat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0), 0x0) 07:00:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote, @in6=@private2}}, {{@in6=@private1}, 0x0, @in6=@mcast1}}, 0xe8) 07:00:35 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000920004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:35 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000411090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x2, 0x0, 0x0) 07:00:35 executing program 2: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000080)={'syztnl0\x00', 0x0}) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) 07:00:35 executing program 4: utimensat(0xffffffffffffffff, 0x0, &(0x7f00000002c0), 0x100) 07:00:35 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000412090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x4e, 0x0, 0x0) 07:00:35 executing program 2: waitid(0x0, 0x0, 0x0, 0x20000008, 0x0) 07:00:35 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000464090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2120.044918][ T5435] loop5: detected capacity change from 0 to 255 [ 2120.070465][ T5435] FAT-fs (loop5): count of clusters too big (2359294) [ 2120.077268][ T5435] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:35 executing program 4: pselect6(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x40]}, 0x8}) 07:00:35 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000a20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x6, 0x0, 0x0) 07:00:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x49, 0x0, 0x0) 07:00:35 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400046f090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:35 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404020a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:35 executing program 0: syz_mount_image$nfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000340)) 07:00:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) 07:00:35 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000b20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2120.210921][ T5458] loop5: detected capacity change from 0 to 255 [ 2120.223107][ T5458] FAT-fs (loop5): count of clusters too big (2621438) [ 2120.229954][ T5458] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f00000000c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x101}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x46e}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa362}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdec}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffff98}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x779}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_NODE={0xd68, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xd61, 0x3, "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"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x800}, 0x4004) 07:00:35 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404030a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) read$ptp(r0, 0x0, 0x0) [ 2120.301310][ T5474] loop5: detected capacity change from 0 to 255 [ 2120.311082][ T5474] FAT-fs (loop5): count of clusters too big (2883582) [ 2120.317992][ T5474] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:36 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa19, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f28d00000173d5e822a7632200"}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x1}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000180)='./file0\x00', 0x19) write$binfmt_script(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="230228be73a21ad1035d9191b967045737655231dbd54bebb258237f2a56e377b1664c9bbca78fb95cac851e9f9957e6df5910be1479c0fcd3cfd7330d03d828fd22416abbae9786d8e67435329abda6e445acaeb4deeea0b1b7acac484277348c8772c617f8b7a0ddad336210ace210b6c9b34ec07f35175f68acb355924d729e067377e249403ae27819d71d5b1451e08a664ee06c1a1308a5bcb263b6c682c18a2674058bc9c6d4c6adb4823b91016a4ea973f19b88d5038681b76c8280019f8c5fb303f05e8be61f80f6fafa21701b546e438b560400d711e71c033ccc13a39bf75a4d1788c8c4467077e32722d80200000022da1a"], 0x141) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) close(r4) clone(0x2040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 07:00:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001000)=@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80) 07:00:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404040a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, @xdp, @ax25={0x3, @null}}) 07:00:36 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000c20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:36 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='gid_map\x00') 07:00:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000001400)={0x0, 0x0, &(0x7f00000013c0)={&(0x7f00000000c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_SOCK={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x101}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x46e}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa362}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xdec}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffff98}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x779}]}, @TIPC_NLA_MEDIA={0x6c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_LINK={0x10, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x20}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x94}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8}]}, @TIPC_NLA_NODE={0xd68, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xd61, 0x3, "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"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x800}, 0x4004) 07:00:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404050a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ecryptfs\x00', 0x0, &(0x7f0000000140)='virtiofs\x00') 07:00:36 executing program 2: syz_mount_image$nfs(&(0x7f0000001a00), 0x0, 0x0, 0x4, &(0x7f0000002f80)=[{&(0x7f0000001a80)="c4de35fa76d732ff70b9d2e6f964d8ae02f855aed642007be202e46ef5f605c5d9", 0x21}, {&(0x7f0000001b40)}, {0x0}, {&(0x7f0000002d40), 0x1000000}], 0x0, &(0x7f0000003080)={[{'broadcast-link\x00'}, {']#(Q%'}, {'syz0\x00'}], [{@seclabel}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'net/icmp\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':$*[\'-\\^'}}, {@smackfsdef={'smackfsdef', 0x3d, '*'}}]}) 07:00:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404060a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:36 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{}, {0x0, @remote}, 0xa, {0x2, 0x0, @local}, 'syzkaller1\x00'}) 07:00:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x195738, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0x84b80b83, 0x0, 0x0, 0xffffffffffffffc2) 07:00:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404070a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2121.141863][ T5494] loop5: detected capacity change from 0 to 255 [ 2121.169827][ T5494] FAT-fs (loop5): count of clusters too big (3145726) [ 2121.176646][ T5494] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:36 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000d20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:36 executing program 0: r0 = open$dir(&(0x7f0000000180)='.\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1ff) getdents(r0, &(0x7f0000000040)=""/236, 0xec) 07:00:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404080a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:36 executing program 0: socketpair(0x10, 0x0, 0x7, &(0x7f0000000000)) 07:00:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740004040a0a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740004040b0a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2121.282897][ T5525] loop5: detected capacity change from 0 to 255 [ 2121.310717][ T5525] FAT-fs (loop5): count of clusters too big (3407870) [ 2121.317513][ T5525] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r1, 0xb, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_DISABLE_HT={0x4}]}, 0x20}}, 0x0) 07:00:37 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/uts\x00') 07:00:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740004040c0a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000e20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2121.552167][ T5550] loop5: detected capacity change from 0 to 255 [ 2121.560448][ T5550] FAT-fs (loop5): count of clusters too big (3670014) [ 2121.567251][ T5550] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:37 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000040)="900000001c001f4d154a817393278bff0a808f78020000006c36710414000100ac1414bb0542d6401051a2d708f37ac8da1a29760099c5ac0000c5b068d0bf46d3234565778d8757006113ffaf6c3efed495a46215be0000766426c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b001500de1df32c1739d7fbee9aa2417318e9e0b390100000000000000000", 0x90, 0x0, 0x0, 0xffffff8a) sendto$inet6(r0, &(0x7f0000000240)="900000001d001f4d154a817393278bff0a80a578020000000404840014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000766436c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) 07:00:37 executing program 0: clock_adjtime(0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, 0x0, 0x7, 0x84d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6, 0x6, 0x224a}) 07:00:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740004040d0a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000500)="73fa", 0x2, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000001d00)="2d89dbe28eb02cba0010a90000000000fd00fa088bfc6f073ca182aa4fc2d2e9418f33a82a63e781d3794b1b8d7ce54a2d1f92e15ae19ef86595f01e4e4b2055fbb2dc808fa739220db0a1d044", 0x4d) recvmmsg(r1, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000000c0)=""/79, 0x4f}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) 07:00:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000f20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2122.119534][ T5561] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2122.150686][ T5567] loop5: detected capacity change from 0 to 255 [ 2122.153467][ T5561] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.4'. 07:00:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="04000509000000006661740004040e0a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:37 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000940)=ANY=[], 0x16) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000240), 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000940)=ANY=[], 0x16) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) 07:00:37 executing program 0: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000280)='SYZKALLER \b', 0xc, 0x600}], 0x0, &(0x7f0000000180)=ANY=[]) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x0, &(0x7f00000001c0)=0x317f, 0x0, 0x4) pipe(&(0x7f00000000c0)) getdents64(r0, &(0x7f00000001c0)=""/69, 0x45) getdents64(r0, 0x0, 0x0) 07:00:37 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000400)) timer_settime(0x0, 0x0, &(0x7f0000000440)={{}, {0x0, 0x3938700}}, 0x0) timer_delete(0x0) 07:00:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404100a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2122.175165][ T5567] FAT-fs (loop5): count of clusters too big (3932158) [ 2122.181969][ T5567] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:37 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)={0x0, "c93856fd18678c6084a068ea12d9b11e5bd43e9457f2b01719dc71d58c73c0907957c6d2fd171b52cd12dae37975d9911984364916431611991b42e76962013f"}, 0x48, 0xffffffffffffffff) keyctl$set_timeout(0xf, r0, 0x0) 07:00:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404110a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000300), 0x6, 0x9641) io_setup(0x9, &(0x7f0000000040)=0x0) io_submit(r1, 0x2, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000340)="88", 0x1}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 07:00:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8001020004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:37 executing program 4: perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x7, &(0x7f00000001c0)) [ 2122.325411][ T5595] loop5: detected capacity change from 0 to 255 [ 2122.346612][ T5595] FAT-fs (loop5): count of clusters too big (4194302) [ 2122.353411][ T5595] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x45, 0xda1, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000480)={0x2, 0x1004e20, @dev}, 0x10) sendto$inet(r1, &(0x7f0000000500)="73fa", 0x2, 0x4008800, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) write(r1, &(0x7f0000001d00)="2d89dbe28eb02cba0010a90000000000fd00fa088bfc6f073ca182aa4fc2d2e9418f33a82a63e781d3794b1b8d7ce54a2d1f92e15ae19ef86595f01e4e4b2055fbb2dc808fa739220db0a1d044", 0x4d) recvmmsg(r1, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000000c0)=""/79, 0x4f}, {0x0}], 0x2}}], 0x1, 0x0, 0x0) 07:00:38 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404120a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x195738, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0x84b80b83, 0x0, 0x0, 0xffffffffffffffc2) 07:00:38 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8001120004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x29, 0x6, 0x0, 0x52) 07:00:38 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000056980)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001500)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001700)={0x3, [{}, {0x0, r3}, {0x0, r3}, {r1, r3}, {}, {}, {r2}, {}, {0x0, r3}, {0x0, r3}, {0x0, r3}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {}, {r1}, {}, {r2, r3}, {0x0, r3}, {0x0, r3}, {r1, r3}, {}, {}, {}, {0x0, r3}, {r2, r3}, {}, {}, {r1}, {}, {}, {}, {}, {r1}, {0x0, r3}, {0x0, r3}, {r1}, {}, {r1, r3}, {0x0, r3}, {r2}, {}, {r1}, {}, {0x0, r3}, {}, {r2, r3}, {0x0, r3}, {r2}, {0x0, r3}, {}, {}, {0x0, r3}, {r1}, {}, {r2}, {r1}, {}, {0x0, r3}, {0x0, r3}, {}, {}, {0x0, r3}, {}, {}, {0x0, 0x0}, {0x0, r3}, {}, {}, {0x0, r3}, {0x0, r3}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {r1}, {r2}, {}, {}, {0x0, r3}, {}, {r2}, {0x0, r3}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {}, {r1}, {0x0, r3}, {r1}, {r2, r3}, {}, {}, {}, {}, {r1}, {}, {}, {0x0, r3}, {}, {}, {}, {r1}, {0x0, r3}, {}, {0x0, r3}, {}, {r2}, {}, {0x0, r3}, {r1}, {0x0, r3}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {r1}, {}, {r2}, {}, {r1}, {}, {}, {0x0, r3}, {}, {}, {r2}, {r2}, {r1}, {r2, r3}, {0x0, r3}, {r2}, {r1, r3}, {0x0, r3}, {r2}, {}, {0x0, r3}, {r1, r3}, {0x0, r3}, {0x0}, {r1, r3}, {}, {0x0, r3}, {}, {}, {}, {0x0, r3}, {0x0, r3}, {r1, r3}, {}, {0x0, r3}, {}, {}, {r2, r3}, {r2, r3}, {r2}, {}, {r1, r3}, {r1}, {r2}, {r1}, {}, {}, {}, {r2}, {}, {r1}, {0x0, r3}, {r1}, {}, {0x0, r3}, {r2, r3}, {}, {}, {}, {r2, r3}, {0x0, r3}, {r2}, {0x0, r3}, {}, {}, {}, {r1}, {r1}, {0x0, r3}, {}, {0x0, r3}, {r2}, {0x0, r3}, {}, {0x0, r3}, {}, {0x0, r3}, {}, {r1}, {}, {0x0, r3}, {}, {r2}, {r2, r3}, {r1, r3}, {}, {r2}, {0x0, r3}, {r2, r3}, {}, {}, {0x0, r3}, {}, {}, {}, {r1, r3}, {r2}, {r2, r3}, {}, {0x0, r3}, {}, {}, {r2, r3}, {r2, r3}, {r1}, {r1}, {}, {}, {r2}, {r2}, {r1}, {}, {}, {r2}, {r1}, {r1}, {r2}, {}, {}, {}, {r1}, {}, {0x0, r3}, {}, {}, {r1, r3}], 0x8, "eed8cc6953666c"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000056b80)={0x0, ""/256, 0x0, 0x0}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000001500)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r7, 0xd000943d, &(0x7f0000000440)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}], 0x8, "0150599fc8c0e6"}) r10 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r10, 0x81f8943c, &(0x7f0000001500)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000056d80)={0x100, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x9, "2726571146fb57"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057d80)={0x8000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "497c43e91ceb35"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000058d80)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000059d80)={0x5, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r0}, {r1}, {0x0, r6}, {r8, r11}, {r12}, {0x0, r13}, {}, {0x0, r14}], 0x80, "a00e54dbe414d6"}) r15 = socket$inet_udp(0x2, 0x2, 0x0) close(r15) socket$packet(0x11, 0x3, 0x300) r16 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r16, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r15, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8910, &(0x7f0000000500)={'tunl0\x00', 0x0}) 07:00:38 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409020200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:38 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)={0x28, 0x3, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x28}}, 0x0) 07:00:38 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409030200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000002c80)) 07:00:38 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409040200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2123.086191][ T5617] loop5: detected capacity change from 0 to 255 [ 2123.112237][ T5617] FAT-fs (loop5): count of clusters too big (4456446) [ 2123.119060][ T5617] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:39 executing program 2: timer_create(0x5, 0x0, 0x0) 07:00:39 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') 07:00:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409050200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:39 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8001220004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:39 executing program 4: pipe2(&(0x7f0000002a80)={0xffffffffffffffff}, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000800)={{}, {0x0, 0x989680}}, 0x0) 07:00:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0xfffeffff, @loopback}, 0x1b) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x4e, 0x4) 07:00:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409060200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:39 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:39 executing program 2: r0 = getpgrp(0xffffffffffffffff) waitid(0x2, r0, &(0x7f0000000000), 0x4, 0x0) 07:00:39 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080), 0x2200, 0x0) 07:00:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409070200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:39 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8001820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2123.987255][ T5652] loop5: detected capacity change from 0 to 255 [ 2124.013963][ T5652] FAT-fs (loop5): count of clusters too big (4718590) [ 2124.020855][ T5652] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:39 executing program 4: wait4(0x0, &(0x7f0000000100), 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000040), 0x0) 07:00:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) r0 = getpid() tkill(r0, 0x1d) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000002ac0)={&(0x7f00000004c0)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in=@local}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {@in6=@remote, @in=@dev}, {{@in6=@empty, @in=@remote}}}}, 0x128}}, 0x0) 07:00:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409080200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind(r0, &(0x7f00000001c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x80) [ 2124.088320][ T5673] loop5: detected capacity change from 0 to 255 [ 2124.113292][ T5673] FAT-fs (loop5): count of clusters too big (6291454) [ 2124.120168][ T5673] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:40 executing program 4: clock_gettime(0x6, &(0x7f0000000140)) 07:00:40 executing program 0: epoll_create(0x3f) 07:00:40 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409090200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:40 executing program 2: mq_open(&(0x7f0000000400)='\xff\xff', 0x40, 0x0, &(0x7f0000000440)) 07:00:40 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8001920004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) close(r1) close(r0) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000580)={0x34, r4, 0x200, 0x0, 0x0, {0x5}, [@ETHTOOL_A_FEATURES_HEADER={0xfffffffffffffd56, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x34}}, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000000)={@remote, r6}, 0x14) sendto$inet6(r5, &(0x7f0000000040)="d2b2453986642b3b0cc6eebde1dd5db2c13662735935e4c9a6f3b133d185d374825be4cfd32e75ba497b3a8e80fa39017f36233ba1f8ea8d2ac362db28a7fa632405b2aac82999", 0x47, 0x40000, &(0x7f00000000c0)={0xa, 0x4e24, 0x81, @private1}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000040)) 07:00:40 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x1c1, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 07:00:40 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090b0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:40 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f00000000c0)) 07:00:40 executing program 4: open$dir(&(0x7f000000c0c0)='./file0\x00', 0x1a1000, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000012480), 0x0, 0x0) 07:00:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x0) [ 2124.927757][ T5701] loop5: detected capacity change from 0 to 255 [ 2124.945875][ T5701] FAT-fs (loop5): count of clusters too big (6553598) [ 2124.952702][ T5701] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:40 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8002220004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:40 executing program 4: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000002a80)={0x0, 0x3938700}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002c00)) 07:00:40 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090c0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:40 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0x0, 0x0) clone(0x3a3dd4008480af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000300)='\x97&\x89\\\xd0\xe7\xca\b@\x19T\\\x8bf)k\x9bw\x16ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8c\xecR\xb2\x1b\x99vS\xa6K&u\x9dX\xcc\r\x12\x01\b\x00\x80\x00\x00\x00\x00E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xebG\x86\xb2\xdeY\x17yX $\xfcU\x9d\x80dX\xcc\xab\x84\xd1\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8b\xd6r\xa5|\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c\xdc\xa8\xd30HX\xe9\t\x18)\xcf\x1am\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89ms\x1d\x1c@\x8eu\x85\xce\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e\x9e\xe57\xda{\xe1D+\x1f\xdd\x9aY\xcd\xbf\xbc\xc8\x85\x1c\xdb1\xee\x14\f{\xf35\xcbH\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% \x00\x00\x00\x00\x99\xdd\x80\x03\xec@\x9f\x8elx\b\xf1\xb4^X\x99\xbb\xa0\xf5Bx\xa9cT\f\x99\xbf\xb5\xebj.t\xa2E#\x9c\x14_\x19\xe1\xe0H\x16\xedi:\x00\x00\x00\x00\x00\x00\x00\x00\xca\x97\xba\xf2\x1b\xeb\xa5h\xeb\xb0\xc0xe\xa3\x12\xcb\xef\xda\xa2nBP\xaf(\xb0\xf1\x84\x05\x8cK\x8b\x93\xe9oBx\xd6\xad\xfdF\xee8\xca\x95|\xe2\x84\x11\x1c\x81M\a\x04\xd6\xd1\xed4\xc8\x82\xf2C\xf61\x13X8\x99M\xf1B\xac\xd7\xc7\x1d\x8f\xb2\x80\xf4\x1a\n\xe5\x8e\x80x^k\xfc\n\xd9?g\xa2\x7f!\xdf,\x7f\xa2\xa43\xd3h\xfd\xe7\x1b\x148\x191M\xf4O\xd1%\xa55\x9f[CBF\x00T\xf0\xdf\xe1\xfd\xa8\tKw7hK2(cy\x18K\xef\xfe\xeb\xdf\xc9cX\xf4\xf9\x91._\x9b%\x1a[\xa9ql\x19\xf1,E\xb7\x7f\x993\xf0i:1\x15\x9bYF\x1e\x90\'\xe5\xd2\x19\f&{t%\xb0z \n4\xba5\xa4:\xe8\xdb\xdd\xef\xc4j\xf4@\x8bc\xec(\xb7\xdb\x85\xa3v&;\xaf\xd9\xed$\x9f\x1b0\xad|\xb7&\xbb\xcd\xae\x85\x1c\x865\xb7\xd4_r\xf157\ri\x9b\xe3\xcc\xa9\xab\xf0\x9e\xaa\r\xa1MV\xbe\x82\xbb\xec\"_\xd1]~\xcd\xd7\xc0;\xc7IM&\xb0\x80a\xcf\x13\x1eF\xda\xc5\xb0\xe7]\f\\\x85\xc9Qs:$\xf7\xdcGQY?)\x9a\xee\xe02\xabo\x80\x00\x00\x00@\x00\x00\x00\x00\x00\x00\xbaK\x10t{\xd6\x1a\x03\xfeC;\xed1W\xe6_d\xff8\xa0\xfa\x99\xdd\x92\xe3\xe5y{\xd6\xa0\xc4\ngNn\x9fND\x99\xd9', 0x1) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) fcntl$setlease(r0, 0x400, 0x0) 07:00:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), r0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc) [ 2125.060699][ T5732] loop5: detected capacity change from 0 to 255 [ 2125.087251][ T5732] FAT-fs (loop5): count of clusters too big (8912894) [ 2125.094063][ T5732] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:41 executing program 1: close(0xffffffffffffffff) socket$packet(0x11, 0x3, 0x300) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:41 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r0) 07:00:41 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090d0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:41 executing program 4: getgroups(0x1, &(0x7f0000000180)=[0x0]) 07:00:41 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8002520004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:41 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_netdev_private(r0, 0x89f7, &(0x7f0000000040)) 07:00:41 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000004ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 07:00:41 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090e0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:41 executing program 0: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 07:00:41 executing program 4: pselect6(0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x2]}, 0x8}) 07:00:41 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8004820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2125.820957][ T5763] loop5: detected capacity change from 0 to 255 [ 2125.836600][ T5763] FAT-fs (loop5): count of clusters too big (9699326) [ 2125.843461][ T5763] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000100)) [ 2125.916435][ T5787] loop5: detected capacity change from 0 to 255 [ 2125.935637][ T5787] FAT-fs (loop5): count of clusters too big (18874366) [ 2125.942539][ T5787] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open_by_handle_at(r3, &(0x7f0000000340)=@raw={0x4, 0x0, {"d3"}}, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r3, 0x40049421, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e20, @multicast2}}, 0x0, 0x0, 0x3c, 0x0, "4920c35cfb33fede2bc17d581891758c257ca7c1ade79eb11b0375490e3b109f704ab4fcc9e8256be412a5ca70008eb06d8c33efe3482585aed521daf80afdb5256e3ecc018a55e5a655fea6ac232d2a"}, 0xd8) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc) 07:00:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xec4, 0x14, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xa9, 0x1, "d3c627da505ec891c8305e45d0aadeb76527bba6b294697724684e993ff61e93a3e64ca093ceac512c5a0daecfd82c4381517751baa0c064af3fa219ba48953c404d7df2e4cab42b4e42eafbd64e83fddb431e69fa10b02be6819d3009c26ba813728e2f22f8a356887c749a6575240c65e4d910c65da51c36a7973a1fff1c937630b50385b81992cfcc21e2c01a2ee20364ac42a0ffbdbd7a26b097a9b06eaa43c5e96e5d"}, @INET_DIAG_REQ_BYTECODE={0x15, 0x1, "cd680e5d237be68845c4a64488ef4156dd"}, @INET_DIAG_REQ_BYTECODE={0x81, 0x1, "5260be728de380f5126169cb48cb8b5309de5e03d25a4d7a9bc52142ebf7efe85a1b1fc0cdb418ea6bcb865d6860d87a773506d9bc771567cff49d72d6e3b5e68a6752129a24f965214bbe1cd1babd83b13b436dff17b051a863b3752f059a6fed237a6bed4dc59ebc8721a1900f93185fa24861077322a0d009b189f7"}, @INET_DIAG_REQ_BYTECODE={0x75, 0x1, "f7a39e0008f80e29250201f4160b7585004e03f120e31d2875e6625f207e84b930e2e3714204472a3e98c8e4e2c53e056ec6d56da4216989df515255dc1cab2822845164be9811888b17098ec872cd6cc2258337d41f3fda38815ad91dbb88cb4f8df53205f1ec124f34011a786232810b"}, @INET_DIAG_REQ_BYTECODE={0x49, 0x1, "dac1c8229a1f321ecd98ca6166690f17b7385b0d1b19d5956f132b95989fcf2fb7c464adaa5b9bf530df6f319ad2cc012b0e97f00d33173277a1e3a9471e107142048810d2"}, @INET_DIAG_REQ_BYTECODE={0xca1, 0x1, "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"}]}, 0xec4}}, 0x0) 07:00:42 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090f0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:42 executing program 2: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 07:00:42 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8004c20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:42 executing program 2: alarm(0x3f) 07:00:42 executing program 0: rt_sigtimedwait(&(0x7f00000003c0), 0x0, &(0x7f0000000480), 0x8) 07:00:42 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409100200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:42 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x44, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x44}}, 0x0) 07:00:42 executing program 2: socket$inet(0x2, 0xa, 0x2) 07:00:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 2126.684791][ T5808] loop5: detected capacity change from 0 to 255 [ 2126.705049][ T5808] FAT-fs (loop5): count of clusters too big (19922942) [ 2126.712028][ T5808] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x3}, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:43 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8006020004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409110200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'tunl0\x00', 0x0}) 07:00:43 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)={0x20}, 0x20}}, 0x0) 07:00:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000a40)={'tunl0\x00', &(0x7f0000000980)={'gretap0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @dev}}}}) 07:00:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0}, &(0x7f0000000100)=0x78) 07:00:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409120200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:43 executing program 2: socketpair(0x2, 0x1, 0x2, &(0x7f0000000080)) 07:00:43 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f00000000c0)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) 07:00:43 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8006820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2127.619811][ T5843] loop5: detected capacity change from 0 to 255 [ 2127.631685][ T5843] FAT-fs (loop5): count of clusters too big (25165822) [ 2127.638588][ T5843] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="040005090000000066617400040409250200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2127.727383][ T5867] loop5: detected capacity change from 0 to 255 [ 2127.738577][ T5867] FAT-fs (loop5): count of clusters too big (27262974) [ 2127.745473][ T5867] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14) sendmsg$ETHTOOL_MSG_FEATURES_SET(r3, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000500000020000180080001010085cc05c39a81fe0b821e48948b65d078f1fc44944f8a5ef79d790aa1c28b16bd38339eac67654eb6f832ff790f2017b8d357ead4cbd458c6f0f417327dadc8db621295211522313f0eb6f1fe545e59ddd78840506f784fdbbfdcb41860359f850e6c1c1835089a3815bc171f4b67d9ac90a6a14aecdfc03d42c6a8e8a2a476484574fd9cd8861d6882ff6075479c66fd8efba56d2a2c452d011ec225fad2da1c7c535e", @ANYRES32=r6, @ANYBLOB="1400020076657468305f746f5f62726964676500"], 0x34}}, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000080)={@private1, r6}, 0x14) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r7 = socket$nl_sock_diag(0x10, 0x3, 0x4) splice(r1, &(0x7f0000000000)=0xfb90, r7, &(0x7f0000000040)=0x80000000, 0x20000000008b, 0x1) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:43 executing program 4: socketpair(0x1d, 0x0, 0xfffffffe, &(0x7f0000005bc0)) 07:00:43 executing program 0: socketpair(0x1d, 0x0, 0x3f000000, &(0x7f0000005bc0)) 07:00:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0300027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000640)={'bridge0\x00', &(0x7f0000000580)=@ethtool_perm_addr={0x20, 0x6, "52de6d4f6cf6"}}) 07:00:43 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8006c20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0400027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:43 executing program 4: socketpair(0x2b, 0x1, 0x0, &(0x7f0000005bc0)) 07:00:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r0, 0x6, 0xffffffffffffffff) 07:00:43 executing program 0: pipe(&(0x7f00000024c0)={0xffffffffffffffff}) accept$inet(r0, 0x0, 0x0) 07:00:44 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x78) [ 2128.510256][ T5895] loop5: detected capacity change from 0 to 255 [ 2128.544163][ T5895] FAT-fs (loop5): count of clusters too big (28311550) [ 2128.551120][ T5895] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1c}, 0xd}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000040)=0x6, 0x4) sendto$inet6(r0, &(0x7f0000000080)='\'', 0x1, 0x0, 0x0, 0x0) 07:00:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x1, &(0x7f0000001080)=[{&(0x7f0000000080)="03467e91936c6e7bd84e54855eb57fb5ec5b76cee7106f20dc8f9514adbf8159894816a9c391236358d5ac7634ad92e134a993e75f76faf68a5f6d9f83f2003edc81be9b58aa10ba779c2fa7fcc582b42b6e6c26283b17b85aa9a722d37050a44be8a95704804ac7956893f91ba7df870828dfcbd319ac5dd3777cbb4a3d890662c12641e92943830cfd2c7249ce258043e5088b831c7361690c757c9d71709f32983e106c865498f497ae2f3e2bb7d1b61ef8c3f59d196f307be08b8b0c173af2a67dd8f22b9e2b717d17ee9a6f328dbfa65ea11b1c3557e032cbe236bafcff86adbc964c4488dff89ead081a5439f558df84ce6fdaf30eac7b559fc1f9061c96743030c5f11158608d50dbf00a7f72e8e92a6e4e9497080d9c52c00389c16d84c893db83f17874d02fb642d64ad0a759222a88fedd5eb73ef5b4cd2c345baf58ebe4b92b8ef78344226800254ff8c4d85d80ca1e77f2a445dd6da898f9091604b5cc63c4a146b87ae6c0655b060efd0cb1376050377fc4d7b57f4bcd7292b352dd80a6bbc731deda813f571d5dd2ab1b84f366509f1a42d86a56094ad1936aefbb34e34b5fd08bc19facfb8b0a8d88d53a327626289e74e35b715abfe5cd02be96de3505bc4502119f17a1ee1ffba73b79c3e55af18c13720de4141994aec1886514884e61493676a357c6b511d77953e5b2a90bf618034cdb14592d4f3cdcceccfa2458afe8b677a96c084f4e92fe1e87c47049816ee44f8aa2553f2cf85e37b4bc09cc7830f57c704dc7166dc3eec81ec6500839e843c94dd0528ba431d8bbbdc629615f98cd6f3932de2b5e18d240006d76dc4ca595fe6aac9c800011fb0a57ef14368cf3caf29962cb5d17aff6727a84b47334c122470ffa6e25dc609845225bfbf1749bd899842bb3f95f54c65de5c4df1cb6bebb3d4820c24a1e9bae2dd9204c10605992de071153cfcc85bfd85ce25d1e62182b3569c2806bdcafd9717e9237f670f033dc76558c029e6cd52a9d61b24fb11919798e5a62de77255d6961baad0e9e7598119f802de23f14f1a790f097a4c1c2b343ec20f53725b0091191f51e2f608e0d9bfa0a5284e521f3fac790f0c1711e19325835f715678985a59c5fb69ce7acdf6266783cc472b9b7059556d82602cf112847538481136d4a9c85b413959118e1e17755eba7c59989b73f8c3604546e4548c5d9f4d7327baf4771313368eda505224e469da70073f9e434c53da8cd950067455965551f8533bf065607a5eba99252fe52d0b8f584babb70aa59d8502cd9ce4d5157e8540eacb2429ef06e143a03dda648451242e2740cada43ec402059e6f4cafa94dd9e38975a5bfa7ff641b9311f5cf1d877ad9bb8ba9dee26e7635c7e95bc222ff9452beb3ab431d7a8090f49ab8e578bfb02240e15cc70b4c29e04d0267a8cafe76aa04acdc733bf6754d8452f0e8acffc5ad854344071c47ced572680c55ca3752e8df89d9fd96ac07732fb849f92317100ec4ff6982b9a828fb1fed467b92d07334411c191ea4396f3946b57f0d0895588dc12f4e2fc009ad9464bcf6d0833ae4a16856b264e4e5ed0be6efb4cd28436a319a360be27ab5d6d2f590c4a486c99f5fabaea13e92b5d9c31171b50c70d3190d4d5286575e408d2e72e02351de74e9cd407881990cb9711d9b13012b7cb601274fad20b87b3c13a9386e8943c846243eedccfbc2dbcbb7cdf738d2170cc1fccf5504f95933dbc18763a30c64f4fae8131edee6a5d0560a4fce4b140fbc81535bb0a4778b60d3383bcd3dba7b30965b5f4f1a01a9d76ca5bbbf5414bb7796843583608f39929e0fa082ee14715388ae9e1f04d57bfe8c3701b1e8bd995769a427137cea8c4c48c620edbd13abd79a3d6d7726ba1690581dc10cbe6d735dd2e564dbd10cb0c266fc227d33d574442d46619e52256d5f2198ba2f5ec74855685bd79c2fe6a2255603073d3f24abe28fccf0d63695c27f6162b6355c090169f9835664410579649485ebeb59c43a8e844163a9d30799ecf0586e10ea350ef9a30e73858005b89e6028b76560ecf503ae32b06ec1de532069e219cb87b426eac9b91e222291396ba860b8353d91386d2c46308f5b5a00fe1e8453d961f5dd1ce97ea2ce8e89407d2083e31d1c9c6cf8118f000df34367fa740d3c197485008e7279cf6cfdbf406dda71442b0b04be0851790eaa28203639f6baa2b278bd32f9ce616a2ac9e3b8ea75c2feea0dabdf98ecbb63dabebf0806ccd8bbbaa6a38b6b88bd7e4fd4edc562ba386ac473673772d47ce911b74548a738b381756d1b817409dbcca5e35a41b52df60a233cb39280a7503a60762c7c4f2cca33bf873848c2f39e91ef40b84f6aa75c81a37bd79bd1dc2dc4737d5fa9b3d4cdcba06b66cdcfe6110292f802c7a39a85bd2b06bab949dd4576c937e4e99d8b6c0ea6192e14396ddfcce679a35809f73bd8a9902b3bf08a2865ccc46024ee446c7229ea49020c8639948315b2b9418c4df734fcb3d45106b7be1b502895f9ef3e1ef61f481923f938dfad2dabbea40d1d45aaa2b84e47b2b1669c68bf9a0b25a7697dfe22117f0520cf12a3825312fa7d1d45beddb22de1e18049116eb30ff4c4904aff1d6761ec476c07524a20db3f08a5f87521d322c6e80d98517ec5310876f7bfd82fdfcef60aff4aa0f1d7e6b6d8366f8adf6f0922a8fbd07a5e59ceec2ea7f3e1d50bfb25cf64b74b0278c4164db7f1d33310e2ff6115b7a95649a78869684011ef356db7410896802e2210b0f74bff75e0abfa1648b055b86661e93b54b51bf24f1021a5b5e2a6afd90a40a192aa4ecbc511a4055eb6027c3c22ba6bad7134b292953473e18ca6d23dc5b9733058cbee25d8864ee9e3678aae9fa999fa5de1690bac7860793c3f2008c7f622a6a37fe2144bc855aaa6a08b81cc278727e9cd5fc9a21701d0d4892ea12b436bdddca60f378f3dc635af2b6da48171964e567f3b9bfa9cac84b00fd252ecd492d7e2ade66c1578f0ed555f4aba4494e87b211a7e76af469b96540b5791eb9fa34da202c49638304805b5286ad72acea0588aaf2dbdd83e6b8dd3c4b33249ce90eb19b59fc06ef7b788aa22775309459cd1075e955e9e99a07db0eaa46fb903dff22ddca7496109eaa153c0dcc8d55ac3316cb81af754b5d6e2ee93aff91b8edf4678f1cf85d0b872e01658d32c29370ad452318613880442964df6bbcba6ca17ec51ec0b4e63716237540a057bf099873fd0c432bbf5bf97517cdc6a5252392f5625649c225489bdd64373230aa65262314cbdadf74eb9a821912043e48ac3635fd07af99ab92d40669d98e9528f70afdd07c7f0114416775ab8c4de27e50dbf8e8253320fed00536a9f0138674bdb12b0ce01f5008f0eb1d09a830b095e52b12e25c3d2ccbd62f80232bccbf19c11470ccaa024d5163d51171758abbde9254cbe9d498cdfeab920ecd6e53367413d93213519d207225a3f238ffd6d972f484d42ca7d7f68816581ad1602686aa0c27ad6b2050c87175813eaebf4b1b3af8c33faa1f7978a01775ed1b268f209c807bd873a59c6db80f588d697615b4bf13f84c2c5256597f68765584ef74d04732f33802c62dc40bc1ab36aced538288ba191d23e46a4ddb60b0748a63542cc3b8d8ee47218b3ad44fa3f9f7df34d2d4a47e50c7f1782be9b53175e240d5c669ef571d493820c8ece2c0ecc0c6fd5af0c02a008a8f6ecc89892ff5ac242737dd07f071d6fec5ede874d7a90aabf09ff5e6e81b62fb11640c8e5b957702605d831e6799bfc848d75e4be32cc8b605df63508ee23b3d9d8b413dc72004385fd2c2f8073a33dd9e4867b963dd0fba9371f3bd41576ce1c85e78012479483dab7b12b18c36e5d48f32faf1cfbd5b96e93540a44101cd8769c44b7605dc91356cbdc824fe4bda9cfb470c86c043296669b3bd758f3d73cd91a35d2377d32f90fb564918e118c205a84033096051642f36606085221605dd4ab3e49a6bb062baa9d0e824fd2fd8b593ef8938cedf6db562f5d5b1ad406d5429d8366b7da55f8501f7664541b373e062b0ac3ddea6555dfd90331b6e2c2c19ed070ff306462d712ebc649934271ccdbb2e18730e47c362d95c5b7ffd62d810c0fb3684524bd03cdcaaf52c19fce73dda864f970064a78b40a8f9c94454a15f51f46a22424d06475b3ec66e5e5f6eba4eb1ccb8a372bc521ace239ef0ef5f670e8d187cf01ddd1331083fb4e84e477c31c15f631e3e2188fe41604dd46e9323015b092a71f2e92846030655150dabdfd4cb28108777522be13b501ce0e820736ae9f29e858db17c9cddd796b7a29f00fe03c8f115b0d2f66a6e4acded1dc09a0c30569b2441c18ab5d07c98329d466695bc3975d91a7fadd5e4d9ab54974f523e33f6ff15da05ecd60f76518a10e609c1d1d79ee8e72b7539c10b6e916e15da39d21922835385ca2e44c3264360f259dde8c8bb29b3337103a7768da6580b770b868ed8f788bb178f9d05345e4484635ba54ada7e5a1b050fb14f737ce1ee6f69b44b810ce2a57d51aa9850d69d8cd2283ee73b0f1313f3a25bfef06ed8eecd76d83afcbe5fa6e399f7d62410c7ee2544f701f025fab9ddb336ff17c05b4958e04e4faaf8953081d6715fc7e78436ebfa5fa6fc574ab8fef7a9538537504b496b25f8ff409bbfb1fea433575724b5bebbd2a3567b854844ee909b18fe1484576f6614fd7a6dee8e718d2fd704d2e25fcd073226587fd8aabff674cd99f024a02ae1323f526a4fdc6bae19c7f73f343a993acac7423f307fa08375058efdee87ad1f055f62088816cb72d9fc775373ce2a7ceb8983e782bc3a8ed9f54c593e3d0dc283347b9c7ded51ebcc63ad8f0daf6694cf5db8553e1e0d654ea284cb98be3b9200c87fddef1d0c75f69126f0c2411005e21a375240a31d94c6068d02b779e92831ed813c8432a016e523177ba699eb9f5b493471b2703ff567d386e8e8af107b7b643bf6379678b8530904a78923ef2fd5501f9010713ad04aa42c88e388e06481e9495d82142dce07a1d4960a9a0b27ee9c61fcfdda7022332436a68bb44bd44fa37448a8895d2e4583673580c628ced9232babe6eccfd1daf435a7f5e3aad621b42931a81ebdb64b99cb45d0097b52f1c9b6a4862117bbbafaa017b2af249bd94054f3bbdd5d882a3ca81e0edc8b66101b00450ef2751640c70a37ed700e71080fcb5572389cb7270c9292cfd3f937386c4eeb3a43c22b87210afcd14be35d83e537ce42141d83b6d8c36ac56a901320e9afab4318ee17d4880f4cdb0c133938757dcd2c6ef7e0bb09677f5c9562b1d36ba0c4bd87da16948b8b22f2b2206a7852c1ef99420d4529c6180b5c34546b55f9be570b4747c82bdfeaf316f2d82ab0e242c51d722bd3312131a95b0bb7c7af810c5d4134601cce768ac363816246249cec08e097c2464653fc14dbd0ab4dc465ae2e165bb04c4605deb09e71047879c1b86c2dbd5e1fa9b2887c93e04341d278fed2209fb8014b82ea168f3b3f64424255665684d54b03021f65d66e71d7e244d59d38aa6de8a118412c756e4290639a88fec3707f94ed4599ec87ba7740a7608fa400223f1174b10cb742fab52b768ad68ec795e1dbf37e604f277a76ae24c624783df2a7928935d6b1e26289957292f237c20e9bb8044beb731af5790eb2bc6d008956fdc1d60762a5bc6a57e5e64ef82ea20f73a68a421a98d25946efc820b8000da6a75bf7be81b0c987c65523d5c79d6407b", 0x1000, 0x6}], 0x40, &(0x7f00000010c0)={[{@gid={'gid', 0x3d, 0xee00}}, {@huge_never}, {@mode={'mode', 0x3d, 0xfffffffffffffbff}}], [{@subj_role={'subj_role', 0x3d, '-\xd8-{'}}, {@euid_lt={'euid<', 0xee01}}, {@uid_eq={'uid', 0x3d, 0xee00}}, {@fowner_lt}, {@appraise}]}) perf_event_open(&(0x7f00000011c0)={0x4, 0x80, 0xba, 0x3, 0x8, 0xe2, 0x0, 0x20, 0x0, 0x15, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfff, 0x6, @perf_bp={&(0x7f0000001180), 0x6}, 0x0, 0x4, 0xb3, 0x0, 0x8483, 0x0, 0x400, 0x0, 0x3, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open_by_handle_at(r1, &(0x7f0000000340)=@raw={0x4, 0x0, {"d3"}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0700027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:44 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x32) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x240}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0326056a7f1f6d88b967487a4257357d803d7da6a13876ae1241ba7860ac5cf65ac60cded8974895abeaf4b4834ff9227fc5e0b0a3a07e758044ab19a6f7ae55d8", 0xfe6a, 0x20c49a, 0x0, 0x76) 07:00:44 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8007420004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:44 executing program 4: syz_genetlink_get_family_id$smc(&(0x7f0000005c40), 0xffffffffffffffff) 07:00:44 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000140)={[{@stripe={'stripe', 0x3d, 0x8}}]}) 07:00:44 executing program 0: pipe(&(0x7f0000010540)={0xffffffffffffffff, 0xffffffffffffffff}) fchown(r0, 0x0, 0x0) 07:00:44 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5500000018007f5f14fe01b2a49b909302060402000a13010416140539000900350028070100000019000540e0600055060022dc131a014883139b84134ef75adb83de4411000b00", 0x48}, {&(0x7f0000000040)="000000100000000026501a1784", 0xd}], 0x2, 0x0, 0x0, 0xf000000}, 0x0) 07:00:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0800027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:44 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000001c40)={&(0x7f0000001c00)={0x10}, 0x10}}, 0x0) 07:00:44 executing program 0: pipe(&(0x7f00000024c0)) syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) [ 2129.382322][ T5931] loop5: detected capacity change from 0 to 255 [ 2129.404518][ T5931] FAT-fs (loop5): count of clusters too big (30408702) [ 2129.411407][ T5931] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0a00027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:45 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000003e00)='cpu.stat\x00', 0x0, 0x0) 07:00:45 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8007820004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp-reno\x00', 0x5) 07:00:45 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0e00027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8914, &(0x7f0000000180)={'lo\x00', 0x0}) 07:00:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800006, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x10e, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='freezer.self_freezing\x00', 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x200080c0, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x0, 0x40002322, 0x0, 0x0) 07:00:45 executing program 4: clock_gettime(0x3, &(0x7f0000000ac0)) 07:00:45 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0f00027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:45 executing program 0: add_key$keyring(0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000280), 0x0) socket$inet_udp(0x2, 0x2, 0x0) creat(0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x280, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000500)=""/157) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x24681, 0x0) 07:00:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f00000001c0)=0x100, 0x4) close(r0) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x2) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x0, [0x8, 0x33, 0xa, 0x800, 0x7, 0xe3]}, &(0x7f0000000180)=0x78) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000400)={0x1f, {{0xa, 0x4e20, 0x3, @private0, 0x7}}, {{0xa, 0x4e23, 0x10000, @remote, 0x7}}}, 0x108) open_by_handle_at(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="0400540000000000d3000000"], 0x0) openat(r3, &(0x7f0000000000)='./file0\x00', 0x80040, 0x123) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) chdir(&(0x7f0000000240)='./file0\x00') recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) [ 2130.336353][ T5976] loop5: detected capacity change from 0 to 255 [ 2130.375996][ T5976] FAT-fs (loop5): count of clusters too big (31457278) 07:00:45 executing program 2: semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000000000)=""/226) 07:00:45 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x0) clone(0x7a900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000388000/0x1000)=nil, 0x1000, 0x65) shmdt(0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a000000}]) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 07:00:45 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x1, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0, 0x10}, 0x0, 0x0, 0x200000390f, 0x800000000000000}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f00000003c0)={0x0, 'syz_tun\x00', {0x1}, 0x9}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) waitid(0x1, r3, &(0x7f0000000180), 0x80000000, &(0x7f0000000200)) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000440)=""/44, &(0x7f0000000480)=0x2c) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x5450, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r5, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x3}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x1000}]}, 0x24}, 0x1, 0x0, 0x0, 0x20008080}, 0xd0) [ 2130.382899][ T5976] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:45 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8007a20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:45 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a1000027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:45 executing program 2: keyctl$reject(0x13, 0x0, 0x0, 0x9, 0x0) 07:00:45 executing program 4: capget(&(0x7f00000000c0)={0x20071026, 0xffffffffffffffff}, 0x0) 07:00:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:00:45 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a6400027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:45 executing program 0: semop(0x0, &(0x7f0000000240)=[{}, {}], 0x2) 07:00:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000180)={'lo\x00', &(0x7f0000000100)=@ethtool_coalesce={0xe}}) [ 2130.535444][ T6020] loop5: detected capacity change from 0 to 255 [ 2130.556841][ T6020] FAT-fs (loop5): count of clusters too big (31981566) [ 2130.563750][ T6020] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:46 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x244c80, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000040)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r1, 0x0, 0x3, 0x0, 0x0, 0x0) r3 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) open_by_handle_at(r3, &(0x7f0000000340)=@raw={0x4, 0x0, {"d3"}}, 0x0) write(r3, &(0x7f0000000080)="41b8685f73c1ad92c299a10c7beb515cf2ca22ca8962b0ec47768fea6b275290dca6d38ac03bf38efe010b33f0d3942ce4accf268316b440508bdb0d1ec2e7a3ce7ed4e017e69e4b45eb1e266b946d7e71df477f071cfc79937155e85b32ad7728e8571ae516643c5e11064ce96ba386eec77afc1b138f8ef61114838081acc52bb286d15a6afe0a22c55cc029858bbf0b98da3ec60e31717d54ea", 0x9b) 07:00:46 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000001840), 0x0, 0x0) 07:00:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a8f00027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:46 executing program 4: mq_notify(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x4, @thr={0x0, 0x0}}) 07:00:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800fb20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x80108906, 0x0) 07:00:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0e01027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:46 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800fe20004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:46 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) unshare(0x24000000) r0 = gettid() perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x6cb2e100, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$peeksig(0x4209, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 2131.290549][ T6048] loop5: detected capacity change from 0 to 255 [ 2131.312765][ T6048] FAT-fs (loop5): count of clusters too big (65798142) [ 2131.319655][ T6048] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:46 executing program 4: r0 = getpid() r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/cgroup', 0x0, 0x0) fcntl$lock(r1, 0x25, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r0}) [ 2131.395497][ T6066] loop5: detected capacity change from 0 to 255 [ 2131.408959][ T6066] FAT-fs (loop5): count of clusters too big (66584574) [ 2131.415860][ T6066] FAT-fs (loop5): Can't find a valid FAT filesystem 07:00:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000000)="e783ed3dc2e4094ce0f4581e9a9381805986b07bf040d2db6e357de3927eca7701b070203fb9dffa20d3ce223fece6e18c05201c5603250b90497956f6ec014f9230d58b31e0af6df9c25e7138ea069ab30e4301391b4ffc0ad61daa55303c16ddc14dfd798fb081073d7698bed8f0d3cb2c6422f7e7ad85e81d66def3e3fc50ca8b6fc352ed9472e05110153566c3b1edd35f261c65f847f3af8e8d772eaaed560d6c2494472467aba322fad989b1ae8bf9bb6cc31c", 0xb6, 0xc0, &(0x7f00000000c0)={0xa, 0x4e24, 0xd7c, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7fffffff}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, &(0x7f0000000200)="ade77fa833eda2feeefd28d2961eadbc45c63e3d0e726b16641c74d947d1999458c5bbbd6a87a77d8c6e2ba7a60f7b59f04d36a69ab19872a38848549d6e50c74d6220549c9816ceb7c151050f8dad46f7ea8e9942fe0c12279e28ce72e658462bc42537d6cde96b5c", 0x69, 0x0, &(0x7f0000000280)={0x11, 0x9, 0x0, 0x1, 0x20, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x14) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xe7, 0x2, 0x1, 0x8, 0x0, 0x10000, 0x2204, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x13c0, 0x3, 0x401, 0xe, 0x200, 0x4, 0xa4, 0x0, 0xff, 0x0, 0x31acb6df}, 0x0, 0xffffffffffffffff, r1, 0x8) ioctl$int_in(r2, 0x5421, &(0x7f00000001c0)=0x8) 07:00:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a1001027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:47 executing program 2: socketpair(0x11, 0x3, 0x4, &(0x7f0000000080)) 07:00:47 executing program 4: mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[]) pipe2(&(0x7f00000010c0), 0x0) 07:00:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000025004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:47 executing program 2: socket$inet(0x2, 0xa, 0x2990) 07:00:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:47 executing program 4: syz_open_dev$vcsa(&(0x7f0000000400), 0x1, 0x244401) 07:00:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a01ff027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:47 executing program 4: semop(0x0, &(0x7f0000000240)=[{0x0, 0x80}, {}], 0x2) semtimedop(0x0, &(0x7f0000000280)=[{0x0, 0x3}, {0x0, 0x20, 0x1800}], 0x2, 0x0) 07:00:47 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x34) [ 2132.256574][ T6098] loop5: detected capacity change from 0 to 255 [ 2132.285150][ T6098] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2132.330714][ T6098] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2486/file0 supports timestamps until 2107 (0x10391447e) 07:00:48 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = accept4(r1, 0x0, &(0x7f0000000080), 0x80000) ioctl$sock_ifreq(r2, 0x8926, &(0x7f00000000c0)={'veth1_to_batadv\x00', @ifru_names}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = socket$inet6(0xa, 0x80001, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000005c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) r5 = socket$nl_route(0x10, 0x3, 0x0) flistxattr(r5, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r4, 0x29, 0x41, &(0x7f0000000000)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:48 executing program 2: timer_create(0x3, 0x0, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) 07:00:48 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0fff027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:48 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000029004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:48 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0204007400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2133.101638][ T6127] loop5: detected capacity change from 0 to 255 [ 2133.114529][ T6127] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:48 executing program 2: clock_gettime(0xfffffffffffffffd, &(0x7f0000000ac0)) 07:00:48 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0202027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2133.139670][ T6127] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2487/file0 supports timestamps until 2107 (0x10391447e) 07:00:48 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800000a004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000180)={'lo\x00', 0x0}) [ 2133.192589][ T25] audit: type=1326 audit(3628306848.566:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 07:00:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8927, &(0x7f0000000180)={'lo\x00', 0x0}) 07:00:48 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0203027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2133.229491][ T25] audit: type=1326 audit(3628306848.566:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=41 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2133.261078][ T25] audit: type=1326 audit(3628306848.566:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2133.296831][ T6158] loop5: detected capacity change from 0 to 255 [ 2133.316183][ T6158] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2133.322324][ T25] audit: type=1326 audit(3628306848.566:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=196 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2133.334812][ T6158] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2488/file0 supports timestamps until 2107 (0x10391447e) [ 2133.349447][ T25] audit: type=1326 audit(3628306848.566:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2133.387534][ T25] audit: type=1326 audit(3628306848.566:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=54 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2133.411864][ T25] audit: type=1326 audit(3628306848.566:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2133.436122][ T25] audit: type=1326 audit(3628306848.566:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=54 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2133.460315][ T25] audit: type=1326 audit(3628306848.566:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2133.484481][ T25] audit: type=1326 audit(3628306848.566:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=6129 comm="syz-executor.1" exe="/root/syz-executor.1" sig=0 arch=c000003e syscall=54 compat=0 ip=0x4665e9 code=0x7ffc0000 07:00:50 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x34) 07:00:50 executing program 2: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000240)=[{0x3, 0x4, 0x1000}, {}, {}], 0x3) 07:00:50 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000003c0)={0x3, &(0x7f0000000340)=[{0x5}, {}, {0x16}]}) 07:00:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0204027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800000c004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) 07:00:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0205027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:50 executing program 2: pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x7}, &(0x7f0000000180)={0x0, 0x3938700}, 0x0) 07:00:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800000f004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2135.376400][ T6182] loop5: detected capacity change from 0 to 255 [ 2135.397287][ T6182] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2135.407500][ T6182] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2489/file0 supports timestamps until 2107 (0x10391447e) 07:00:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0206027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0207027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:50 executing program 4: syz_io_uring_setup(0x523a, &(0x7f0000000000)={0x0, 0x0, 0x2}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 2135.489455][ T6198] loop5: detected capacity change from 0 to 255 [ 2135.508198][ T6198] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2135.522527][ T6198] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2490/file0 supports timestamps until 2107 (0x10391447e) 07:00:53 executing program 2: futex(&(0x7f0000000000), 0x4, 0x0, 0x0, &(0x7f0000000080), 0x0) 07:00:53 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0208027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000010004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:53 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) tkill(0x0, 0x34) 07:00:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6e4, &(0x7f0000000080), &(0x7f0000ee8000/0x4000)=nil, &(0x7f0000656000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_WRITEV={0x2, 0x4, 0x0, @fd_index, 0x0, &(0x7f0000000880)=[{0x0}, {0x0}], 0x2}, 0x0) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 07:00:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x81, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000040)=""/251, &(0x7f0000000140)=0xfb) socket$inet(0x2, 0x9, 0xfff) 07:00:53 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0209027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:53 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x4d4000, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop0', 0x480, 0x0) socketpair(0x11, 0x3, 0x4, &(0x7f0000000080)) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) [ 2138.429353][ T6220] loop5: detected capacity change from 0 to 255 [ 2138.442639][ T6220] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2138.459733][ T6220] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2491/file0 supports timestamps until 2107 (0x10391447e) 07:00:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000025004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:53 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect(r0, &(0x7f0000000000)=@nl=@proc, 0x80) 07:00:53 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020a027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:53 executing program 2: pipe2(&(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) inotify_rm_watch(r0, 0x0) 07:00:53 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020b027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2138.585006][ T6250] loop5: detected capacity change from 0 to 255 [ 2138.601339][ T6250] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2138.616380][ T6250] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2492/file0 supports timestamps until 2107 (0x10391447e) 07:00:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) 07:00:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000200)={&(0x7f0000000000)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x80, 0x0, 0x0, 0x0, 0x5000}, 0x0) 07:00:56 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000780)='ns/time_for_children\x00') 07:00:56 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020c027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000029004000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:56 executing program 1: socketpair(0x23, 0x0, 0x0, &(0x7f0000000000)) 07:00:56 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020d027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000004380)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@timestamping={{0x14}}], 0x18}, 0x0) [ 2141.481387][ T6270] loop5: detected capacity change from 0 to 255 07:00:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) 07:00:56 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020e027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2141.538816][ T6270] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2141.556324][ T6270] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2493/file0 supports timestamps until 2107 (0x10391447e) 07:00:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020040000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:56 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020f027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:56 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) 07:00:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xe) 07:00:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1020, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0210027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 1: socketpair(0x15, 0x0, 0x0, &(0x7f0000000100)) [ 2141.680109][ T6307] loop5: detected capacity change from 0 to 255 [ 2141.707631][ T6307] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0211027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11819, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020000900000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2141.750920][ T6307] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2494/file0 supports timestamps until 2107 (0x10391447e) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 4: perf_event_open$cgroup(&(0x7f00000004c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80a00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x42000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:00:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() r2 = getpid() sendmsg$unix(r0, &(0x7f0000003140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003080)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xee00, 0xee00}}}], 0x40}, 0x0) 07:00:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0212027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 4: socketpair(0x27, 0x0, 0x0, &(0x7f0000000d80)) 07:00:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2141.892665][ T6364] loop5: detected capacity change from 0 to 255 07:00:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000004380)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000400)=[{0x0}, {&(0x7f0000000280)="bc", 0x1}], 0x2}, 0x0) 07:00:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000f80)={0x0, 0x0, 0x0}, 0x0) 07:00:57 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003bc0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000002dc0)=[{0x0, 0xf0ff7f00000000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 07:00:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020001300000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0218027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000013c40)='./cgroup/syz0\x00', 0x200002, 0x0) 07:00:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:57 executing program 1: socketpair(0xa, 0x2, 0x9, &(0x7f0000000100)) [ 2141.937123][ T6364] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2141.961345][ T6364] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2495/file0 supports timestamps until 2107 (0x10391447e) 07:00:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0219027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000002400)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000004480)={0x0, 0x0, 0x0}, 0x140) 07:00:57 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2142.087696][ T6409] loop5: detected capacity change from 0 to 255 [ 2142.102730][ T6409] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:57 executing program 2: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11819, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:00:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020001400000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:57 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7a900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) madvise(&(0x7f0000388000/0x1000)=nil, 0x1000, 0x65) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x1a000000}]) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x200000b, 0x12, r2, 0x0) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0222027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 1: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000340)='<', 0x1) 07:00:57 executing program 2: openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) mkdir(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_async', 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x2}, &(0x7f0000000400)) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x40006, 0x0) pread64(r1, &(0x7f0000000000)=""/85, 0x55, 0x4) [ 2142.131837][ T6409] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2496/file0 supports timestamps until 2107 (0x10391447e) 07:00:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x1, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5}]}, 0x1c}}, 0x0) 07:00:57 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000001c0)) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0225027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0248027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @rc, @tipc, @qipcrtr}) 07:00:57 executing program 2: syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc8c48, &(0x7f0000000500)) [ 2142.263835][ T6449] loop5: detected capacity change from 0 to 255 [ 2142.300511][ T6449] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x40010023) 07:00:57 executing program 1: socket(0xa, 0x1, 0x7) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a024c027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020002700000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:57 executing program 2: r0 = getpid() setpriority(0x1, r0, 0x4c) [ 2142.325439][ T6449] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2497/file0 supports timestamps until 2107 (0x10391447e) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0260027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) openat$vcsa(0xffffffffffffff9c, 0x0, 0x40000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000400)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pread64(r1, &(0x7f0000000000)=""/85, 0x55, 0x0) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f00000000c0)='.pending_reads\x00', 0x8c3ee50a127bf439, 0x0) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0268027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)) [ 2142.454970][ T6489] loop5: detected capacity change from 0 to 255 [ 2142.477119][ T6489] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a026c027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2142.494257][ T6489] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2498/file0 supports timestamps until 2107 (0x10391447e) 07:00:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000002dc0)={0x0, 0x0, &(0x7f0000002d80)={&(0x7f0000002d40)=ANY=[@ANYBLOB="280000000303010800000000000000000000000008001940000000000c"], 0x28}}, 0x0) 07:00:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020002800000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:57 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x8000000, &(0x7f0000000480)=[{&(0x7f0000001840)=""/4096, 0x1000}], 0x270, 0x0, 0x40020000}}], 0x270, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f00000006c0)="0c268a927f1f6588b967480a41ba7860f46ef65ac618ded8974895abeaf4b4834ef922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecfa0b1a7511bf746bec66ba76b699d3a483904811c5709efa01fa13e4ddc813f76684d3d1529fea5d78b38267db0082270f62b41b50981b0313b668585ad32e8977c5f7c2dc112136b8f7392223205ad86f4a9de1cddbd119f26acc2f", 0xffffffcd, 0x11, 0x0, 0x170) 07:00:57 executing program 4: utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}}, 0x0) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0274027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 1: socket(0x0, 0xaf77723c479c42fd, 0x0) [ 2142.595855][ T6521] loop5: detected capacity change from 0 to 255 [ 2142.618494][ T6521] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:57 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x6400, 0x0) 07:00:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0278027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020002900000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2142.647449][ T6521] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2499/file0 supports timestamps until 2107 (0x10391447e) 07:00:58 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) 07:00:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="12000000030301"], 0x1c}}, 0x0) 07:00:58 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a027a027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2142.773750][ T6559] loop5: detected capacity change from 0 to 255 [ 2142.782863][ T6559] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2142.792452][ T6559] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2500/file0 supports timestamps until 2107 (0x10391447e) 07:00:58 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x2060) 07:00:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4405"], 0x44}}, 0x0) 07:00:58 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f00000001c0)={0x0, 0x15}, &(0x7f0000000400)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pread64(r1, &(0x7f0000000000)=""/85, 0x55, 0x0) 07:00:58 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02fe027400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020003100000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:58 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200037400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:58 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={0x0, @nl, @generic={0x0, "e38eee6ce6c4d102f58ace307ec7"}, @nfc={0x27, 0x0, 0x0, 0x4}}) 07:00:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:58 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x5213c371d4da646a, 0x0) 07:00:58 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x401}, 0x14}}, 0x0) recvmsg(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002440)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x40002170) 07:00:58 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200077400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:58 executing program 1: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x1, &(0x7f00000006c0)=[{0x0}], 0x0, 0x0) [ 2143.544423][ T6587] loop5: detected capacity change from 0 to 255 [ 2143.563625][ T6587] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:00:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}]}, 0x1c}}, 0x0) 07:00:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:58 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02000a7400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2143.623696][ T6587] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2501/file0 supports timestamps until 2107 (0x10391447e) 07:00:58 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020003200000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:58 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000400)={&(0x7f0000000240), 0xc, &(0x7f0000000280)={&(0x7f0000000640)={0xfffffffffffffe3c, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x44}}, 0x0) 07:00:58 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmsg(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002440)=[{0x0}, {0x0, 0xf33d55dca4843a69}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 07:00:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @xdp, @sco, @hci, 0x8a}) 07:00:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02000e7400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:59 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000004c00)) timer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, 0x0, &(0x7f0000000400)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) openat(0xffffffffffffff9c, &(0x7f00000045c0)='./file0\x00', 0x101000, 0x180) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pread64(r1, &(0x7f0000000000)=""/85, 0x55, 0x0) 07:00:59 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000006c0)={0x3c, 0x1, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}, @CTA_EXPECT_NAT={0x4}, @CTA_EXPECT_ZONE={0x6}]}, 0x3c}}, 0x0) 07:00:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02010e7400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:59 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x220007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x8000000, &(0x7f0000000480)=[{&(0x7f0000001840)=""/4096, 0x1000}], 0x270, 0x0, 0x40020000}}], 0x270, 0x0, 0x0) sendto$inet(r0, &(0x7f00000006c0)='\f&', 0x2, 0x11, 0x0, 0x0) 07:00:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2143.759373][ T6629] loop5: detected capacity change from 0 to 255 07:00:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020024000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:59 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)='ns/cgroup\x00') 07:00:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02000f7400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2143.809702][ T6629] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2143.829856][ T6629] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2502/file0 supports timestamps until 2107 (0x10391447e) 07:00:59 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPSET_CMD_GET_BYINDEX(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 07:00:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, 0x0) 07:00:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:00:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0201107400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() tkill(r0, 0x34) 07:00:59 executing program 4: getresuid(&(0x7f0000000040), &(0x7f0000002100), &(0x7f0000002140)) [ 2143.953407][ T6665] loop5: detected capacity change from 0 to 255 [ 2143.963964][ T6665] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2143.986207][ T6665] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2503/file0 supports timestamps until 2107 (0x10391447e) 07:00:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020034000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:00:59 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2, @xdp, @ipx={0x4, 0x0, 0x0, "d39b68a200a8"}}) 07:00:59 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x56, 0x0}, 0x2160) 07:00:59 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2, @xdp, @l2={0x1f, 0x0, @any, 0x0, 0x2}}) 07:00:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02001f7400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:00:59 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() tkill(r0, 0x34) 07:01:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast}, @generic={0x0, "97fda24bdad100245af8f4a1d274"}, @l2, 0xfff8}) 07:01:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xfd40, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x40}}, 0x0) 07:01:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x802) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000200)) 07:01:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = gettid() tkill(r0, 0x34) [ 2144.729883][ T6694] loop5: detected capacity change from 0 to 255 [ 2144.751116][ T6694] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200647400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:00 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x100a2) 07:01:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020044000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:00 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000000)) [ 2144.792419][ T6694] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2504/file0 supports timestamps until 2107 (0x10391447e) 07:01:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f0000005500)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000006557a5"], 0x14}}, 0x0) 07:01:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02008f7400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:00 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=""/38, 0x26}, 0x2060) 07:01:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2144.901022][ T6720] loop5: detected capacity change from 0 to 255 [ 2144.918638][ T6720] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000007dc0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f00000000c0)=""/177, 0xb1}], 0x1}}], 0x1, 0x0, 0x0) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f0000005500)={&(0x7f00000054c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 07:01:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200037400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000002dc0)={0x0, 0x0, &(0x7f0000002d80)={&(0x7f0000002d40)=ANY=[@ANYBLOB="280000000303010800000000000000000000120076"], 0x28}}, 0x0) [ 2144.946486][ T6720] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2505/file0 supports timestamps until 2107 (0x10391447e) 07:01:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200047400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x1, 0x8, 0x101}, 0x14}}, 0x0) 07:01:00 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200077400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020054000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:00 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f00000000c0)={0xff}) 07:01:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x76, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004db80)) r0 = socket(0x840000000002, 0x3, 0xff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000003080)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240)=[{{0x0, 0xffffff7f, 0x0}, 0x201}], 0x102, 0x401eb94) 07:01:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:01 executing program 1: r0 = getpid() capget(&(0x7f0000000180)={0x19980330, r0}, &(0x7f00000001c0)) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200087400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 2: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x580) 07:01:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x24, 0x1, 0x2, 0x801, 0x0, 0x0, {}, [@CTA_EXPECT_NAT={0xc, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_TUPLE={0x4}]}, 0x24}}, 0x0) [ 2145.745903][ T6754] loop5: detected capacity change from 0 to 255 [ 2145.777575][ T6754] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02000a7400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x1, 0x4, 0x401, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x1c}}, 0x0) 07:01:01 executing program 2: syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[]) [ 2145.825598][ T6754] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2506/file0 supports timestamps until 2107 (0x10391447e) 07:01:01 executing program 4: recvmsg(0xffffffffffffffff, 0x0, 0x80002023) 07:01:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020064000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02000f7400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x801, 0x1001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x518302, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x4a581}], 0x1, 0x400fa7f, 0x0) mknodat$null(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @private, @dev}, 0x0) 07:01:01 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f00000006c0)='.pending_reads\x00', 0x101040, 0x0) 07:01:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x29, 0x19, 0x0, 0x8) 07:01:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200107400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2146.003769][ T6797] loop5: detected capacity change from 0 to 255 07:01:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000005540)={0x0, 0x0, &(0x7f0000005500)={&(0x7f00000054c0)={0x14}, 0xfffffe24}}, 0x0) 07:01:01 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000002c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$NFT_MSG_GETRULE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0xa, 0x801, 0x0, 0x0, {0x2}}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x20000004) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200647400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000500)=[{0xfffffffffffffffd}], 0x1}}], 0x1, 0x0, 0x0) [ 2146.053008][ T6797] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2146.085458][ T6797] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2507/file0 supports timestamps until 2107 (0x10391447e) 07:01:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020074000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:01 executing program 0: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:01 executing program 1: socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) 07:01:01 executing program 2: clock_gettime(0x0, &(0x7f0000000080)) clock_nanosleep(0x0, 0x1, &(0x7f00000000c0), 0x0) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02008f7400f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 0: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:01 executing program 1: r0 = socket(0x2, 0x5, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200020a00f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 2: accept(0xffffffffffffffff, &(0x7f00000000c0)=@in6, 0x0) 07:01:01 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmsg(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x2000) [ 2146.220039][ T6840] loop5: detected capacity change from 0 to 255 [ 2146.242747][ T6840] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:01 executing program 0: sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:01 executing program 4: mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) open(0x0, 0x0, 0x0) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='incremental-fs\x00', 0x0, 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000000)='./bus\x00', 0x4080, 0x92) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2001, 0xd2710, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000, 0x0, 0x400001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) read(r2, &(0x7f0000000180)=""/19, 0x11fffffc7) [ 2146.285842][ T6840] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2508/file0 supports timestamps until 2107 (0x10391447e) 07:01:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020084000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200022500f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 2: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 07:01:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:01 executing program 1: open$dir(0x0, 0x40000, 0x0) 07:01:01 executing program 1: socketpair(0x10, 0x0, 0xd1, 0x0) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027402f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000140)=@in={0xa}, 0x2) 07:01:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2146.460431][ T6877] loop5: detected capacity change from 0 to 255 [ 2146.485939][ T6877] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027403f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 1: dup(0xffffffffffffff9c) [ 2146.507515][ T6877] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2509/file0 supports timestamps until 2107 (0x10391447e) 07:01:01 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x63) 07:01:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x10) 07:01:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020094000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:01 executing program 1: r0 = getpgid(0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000040)) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027404f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:01 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x40, 0x3) 07:01:01 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:01 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 07:01:01 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x68942, 0x8) 07:01:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027405f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2146.660396][ T6906] loop5: detected capacity change from 0 to 255 [ 2146.689575][ T6906] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:02 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x22842, 0x0) write$P9_RRENAME(r0, 0x0, 0x0) 07:01:02 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x22842, 0x101) 07:01:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:02 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x22842, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000040)={0x18}, 0xffffffffffffff0f) [ 2146.730811][ T6906] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2510/file0 supports timestamps until 2107 (0x10391447e) 07:01:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200a4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027406f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000004240)={&(0x7f0000000040)=@kern={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0}, 0x0) 07:01:02 executing program 1: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x48cc3, 0x54) 07:01:02 executing program 4: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x6000, 0x1) 07:01:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:02 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x22842, 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) 07:01:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT_BATCH(r0, &(0x7f0000002dc0)={0x0, 0x0, &(0x7f0000002d80)={&(0x7f0000002d40)=ANY=[@ANYBLOB="2800000003030108000000000000000000000000080019"], 0x28}}, 0x0) 07:01:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027407f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:02 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.log\x00', 0x22842, 0x0) write$cgroup_int(r0, 0x0, 0x0) 07:01:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, &(0x7f0000000040)}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:02 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x22fc3, 0x0) [ 2146.926933][ T6951] loop5: detected capacity change from 0 to 255 [ 2146.956069][ T6951] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200b4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:02 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$P9_RSYMLINK(r0, 0x0, 0xffffffffffffff37) 07:01:02 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x22842, 0x0) write$P9_RRENAMEAT(r0, 0x0, 0x0) 07:01:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027408f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:02 executing program 2: mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10, 0x0) 07:01:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, &(0x7f0000000040)}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2147.005278][ T6951] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2511/file0 supports timestamps until 2107 (0x10391447e) 07:01:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) lseek(r0, 0x0, 0x0) 07:01:02 executing program 2: pwritev(0xffffffffffffffff, 0x0, 0xffffff49, 0x0, 0x0) 07:01:02 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) preadv(r0, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000200)=""/247, 0xf7}], 0x2, 0x0, 0x0) 07:01:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027409f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:02 executing program 4: shmget(0x3, 0x3000, 0x269, &(0x7f0000ffd000/0x3000)=nil) 07:01:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x0, &(0x7f0000000040)}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2147.130116][ T6984] loop5: detected capacity change from 0 to 255 [ 2147.175373][ T6984] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200c4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000004240)={0x0, 0x0, 0x0}, 0x0) 07:01:02 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x22842, 0x0) write$P9_RVERSION(r0, 0x0, 0x0) 07:01:02 executing program 4: mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x3011, 0xffffffffffffffff, 0x0) 07:01:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740af801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2147.216714][ T6984] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2512/file0 supports timestamps until 2107 (0x10391447e) 07:01:02 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), 0xfffffffffffffe5e}, 0x0) 07:01:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:02 executing program 2: socketpair(0x1, 0x3, 0x7, 0x0) 07:01:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740bf801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:02 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa) 07:01:02 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002100)='./file0\x00', 0x0) [ 2147.341664][ T7020] loop5: detected capacity change from 0 to 255 07:01:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200d4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:02 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f0000000040)=0xc) 07:01:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 07:01:02 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000000)={0xffffffffffffffff}, 0xc) 07:01:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740cf801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2147.399284][ T7020] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2147.420412][ T7020] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2513/file0 supports timestamps until 2107 (0x10391447e) 07:01:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) link(&(0x7f0000000040)='./file0\x00', 0x0) 07:01:02 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:02 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)}, 0x0) 07:01:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740df801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 07:01:02 executing program 1: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_RMID(r0, 0x0) [ 2147.565412][ T25] kauditd_printk_skb: 40 callbacks suppressed [ 2147.565422][ T25] audit: type=1326 audit(3628306862.818:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7052 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 2147.578083][ T7058] loop5: detected capacity change from 0 to 255 07:01:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200e4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:02 executing program 2: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='\x00') 07:01:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:02 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) 07:01:02 executing program 1: mknod(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 07:01:02 executing program 1: mknod(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) chroot(&(0x7f0000000000)='./file0\x00') [ 2147.638240][ T7058] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2147.654688][ T7058] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2514/file0 supports timestamps until 2107 (0x10391447e) 07:01:02 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0) [ 2147.758150][ T7083] loop5: detected capacity change from 0 to 255 [ 2147.772382][ T7083] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2147.791000][ T7083] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2515/file0 supports timestamps until 2107 (0x10391447e) 07:01:03 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:03 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002740ff801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f00000000c0)) 07:01:03 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000005280), 0x202000, 0x0) 07:01:03 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)={0xd0002000}) 07:01:03 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200f4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:03 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027410f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:03 executing program 2: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000100)="10", 0x1) 07:01:03 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x8041, 0x0) [ 2148.470354][ T7105] loop5: detected capacity change from 0 to 255 [ 2148.491207][ T25] audit: type=1326 audit(3628306863.730:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7102 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 07:01:03 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) [ 2148.515518][ T7105] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:03 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027411f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:03 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x0) execve(&(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) [ 2148.545245][ T7105] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2516/file0 supports timestamps until 2107 (0x10391447e) 07:01:04 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:04 executing program 4: syz_open_dev$rtc(&(0x7f0000000040), 0x0, 0x0) 07:01:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020104000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:04 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x33}, 0xa, @in=@loopback, 0x0, 0x1}}, 0xe8) 07:01:04 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027412f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:04 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000002a40)={0x0, 0x0, 0x0}, 0x0) [ 2149.365855][ T7134] loop5: detected capacity change from 0 to 255 [ 2149.389022][ T7134] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000003ac0)={0x0, 0x0, &(0x7f0000003a80)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000003b40), 0xffffffffffffffff) 07:01:04 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027418f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:04 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) lseek(r0, 0x100, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x191) accept4(0xffffffffffffffff, &(0x7f0000000400)=@l2tp={0x2, 0x0, @loopback}, &(0x7f0000000480)=0x80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() close(r0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x6) 07:01:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0xfff, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "01abdc8cdc4e942486264f4244b70ef91a7f01c1ce076940986bf374e2f9c6d3176241f1f4a5c56e1493d55de4337058a498d1741bdada7c855b7bb069480fed", "fecc13b95840156b31855c32a2739e67b69bb03509ce22be79d7a4697a871cd75e6d65e81b132f446c8a4e2a248d183d129ccfddc0ba4e241e5fa0b7cbaaa5a1", "1148c17e91fdf0099ead1a9a5aea6524e02e72062f6e3d4976e1ecec5e6fe788"}) 07:01:04 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027419f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:04 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000002400), 0x301080, 0x0) [ 2149.401888][ T25] audit: type=1326 audit(3628306864.633:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=7135 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 [ 2149.452866][ T7134] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2517/file0 supports timestamps until 2107 (0x10391447e) 07:01:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, 0x0, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:05 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) fcntl$setstatus(r0, 0x4, 0x2800) 07:01:05 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_OPER(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000003ac0)={&(0x7f0000003a00)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000003a80)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003dc0)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000003e00)={'wlan1\x00'}) 07:01:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020114000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000002040)={&(0x7f0000001f80), 0xc, &(0x7f0000002000)={0x0}}, 0x0) 07:01:05 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027422f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:05 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027425f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:05 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) clock_gettime(0x0, &(0x7f0000000080)) ppoll(&(0x7f0000000040)=[{r0}], 0x1, 0x0, 0x0, 0x0) [ 2150.270976][ T7174] loop5: detected capacity change from 0 to 255 07:01:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000002040)={0x0, 0x0, &(0x7f0000002000)={0x0}}, 0x81) 07:01:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, 0x0, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:05 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x0) [ 2150.313970][ T7174] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2150.330350][ T7174] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2518/file0 supports timestamps until 2107 (0x10391447e) 07:01:05 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020124000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:05 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027448f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, 0x0) 07:01:05 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, 0x0, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:05 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x0) 07:01:05 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002744cf801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:05 executing program 2: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000094c0)={0x0, 0x989680}) getresuid(&(0x7f0000009740), &(0x7f0000009780), &(0x7f00000097c0)) 07:01:05 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x0) [ 2150.475767][ T7213] loop5: detected capacity change from 0 to 255 [ 2150.513789][ T7213] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2150.528023][ T7213] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2519/file0 supports timestamps until 2107 (0x10391447e) 07:01:06 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 07:01:06 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027460f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:06 executing program 2: clock_gettime(0x0, &(0x7f0000003100)) getresuid(&(0x7f0000009740), &(0x7f0000009780), &(0x7f00000097c0)) 07:01:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:06 executing program 1: clock_nanosleep(0x0, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x0) 07:01:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020184000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:06 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027468f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:06 executing program 4: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000003ac0)={0x0, 0x0, &(0x7f0000003a80)={0x0}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000003b40), r0) 07:01:06 executing program 1: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$inet(0x2, 0x2, 0xba) 07:01:06 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002746cf801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:06 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0) [ 2151.289681][ T7237] loop5: detected capacity change from 0 to 255 [ 2151.328360][ T7237] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:06 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000af4000000060a0116000000000000060000000000000003"], 0x1}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000800)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000880)="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", 0xdcf}], 0x1) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98000000000201080000808ac14ca86abe4b0003600003001400010000000000080002000000000914000101080001000000000708000200ac1414bb"], 0x1}}, 0x0) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.'], 0x1c}}, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 07:01:06 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027474f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:06 executing program 2: sched_setattr(0x0, &(0x7f0000000000)={0x38}, 0x0) [ 2151.360610][ T7237] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2520/file0 supports timestamps until 2107 (0x10391447e) 07:01:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:06 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0, 0x0, 0x0, 0x40000000}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x8, &(0x7f0000000000)={@local}, 0x14) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 07:01:06 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020194000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:06 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000af4000000060a0116000000000000060000000000000003"], 0x1}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000800)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000880)="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", 0xdcf}], 0x1) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98000000000201080000808ac14ca86abe4b0003600003001400010000000000080002000000000914000101080001000000000708000200ac1414bb"], 0x1}}, 0x0) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.'], 0x1c}}, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 07:01:06 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027478f801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:06 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000005280), 0x202000, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, 0x0, 0x0) 07:01:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:06 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000af4000000060a0116000000000000060000000000000003"], 0x1}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000800)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000880)="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", 0xdcf}], 0x1) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98000000000201080000808ac14ca86abe4b0003600003001400010000000000080002000000000914000101080001000000000708000200ac1414bb"], 0x1}}, 0x0) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.'], 0x1c}}, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 07:01:06 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003dc0)) 07:01:06 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a020002747af801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:06 executing program 4: sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000000000000000000000000af4000000060a0116000000000000060000000000000003"], 0x1}}, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000340)='-vboxnet0\x00]\xea\xb0\xe2N\xc6c\x05\x8d\xb5\xc0\n\xad\x0f#+\x17\xd6A\xf4\xdf\x1b\xf9~\x8e\"\r\xff\xbb\xb0\xc3\x86\x97\xaf\xf8\x7f*\xfc\xfd\xe7\xcc\xbc\xddI.\xc3\x9aQ\xc8\x8e8U\xdaX\x06\x92\x1d\xbd\x10\xf9\xe8q\x00\xddr>\xd7\x9f\xf8r\xeeE\xa83K\xf60 \x7f\xcd\xac\x86\x9eT*\xf7\a^L,\x98\xa2(2,\x8c*\xff\x8aA\xa1\x153\x15\b\xcb\xf7\xefw\xa6\xc7c@\xb5\x9b\xdc$`3]\xf9.\xcf\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000800)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) writev(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000880)="e62ba87d97aeb2f15be281a03b6a7d8e42426799fa6bbd0df291838e9d846d0041890552314d13482d884106d44b0b23cab5e50df8a80847c2932df0a89889a90844365cb1c9218a33bca9b325657684733e6facc0137b68ea5bec1646c7c2289a179f2dbe44e3800ef03953e1ef3740bc3cbd449c7fe5042ad294a499feebabb745cf11b4783589f0d45090baf6660d80a2811ae1af1f323475a71413e3e6622e0d7bc7094a642c2780e03211382b2f3a0ada042eb2a71bdffff759ff3e7138c1c2175d634a82fcc82a5c968a11154f95e3168cfa5325cd4174651c62401af5772de6eddb2077f30dac0ebb390a2a71646d306670301380e681c1efe7097e742c3ebc7511c1d83db2fb0bcf33a39cee168d307642b5bc4f908804a3f7558276fe883d1c70fdc16136dffaf117a6b3bb388b174c17344b910d9956522b838f925c5353d96c0d8035411c5d77e0c1e76371d80c3d9616f1504505190bc52e07c8e27b5e537d0b35c11d9b3cc9a8d3e27955eba3fde3c8b7cf744151d9e03f73e6447964ae3198cabc85d55990ec76834757f69d8f9a48af157788bee6ba224793493b90e07cce7f265e7580a231ba3c4021b2f61fd8d59d02109a7704536a036bf43f4c0c0c12280a0ac0dbf7ca44852ff8e27fd1365746ea9a920232cac722d6b0c0180401f9a5bf7d3d85df283a538bae13fe754b4f032cdcc70248505dacde89cc4338a013e595701d92043865739045cf76971456729d732e916fe459f8703a967c587bb923141a131d2d176316c98d302f09f3c44288d9e8c7faedbe3b983d991992c76f5e8e85f6effa605e9627f8992a10197426e9f411500458aab6ce8f1a55a3eb49084c32c6a5557542bc4a0b491558be3b182752a02ada4e16d423025b3ed54af711e558b6482624ec633d9b2a865d5739e08c50b2c5012975208b8c8d534e58bcd2e2d1213be44c30a7bbd1b9e850f3f83669814b8cc669f3e3d757c1dfb464bc55abf34aee58f48baabfa8b184e88bf11652dc9e6574f5b6ef3c74c7f3334a6be137beeb23bc2831d5a27831daf9b3202cda35245299c20e9c829829db07c0af7b2bacbcf914817b8ce6e863d072eb472ec59568769142aa9e34525d2cdae196533bc8d0c51b81f9a98d54512377aba18765888030806e32598ef6741e0b2a6ab74f34e7a30005182fa0066d008ac3daf0450f46e5d604dfd2c266b40e3cd1f1b2d9e4ffe083a7f598cd5cbf909859a79999d4376a9dabf7b9bbd2496585557f9c4f064d91418102d20daf1aa8560996881e7eae0973a9b47fc091ef03f36ad76f22a9ae2aa5c211d9916398cbea65490d18e8eb2c001353f98937300c655b29b95305be15359a4b6c39c2fbbec37d1c8bcaed4523cf976771ef380c60b68156ae9b28362f51ea78fd473311568e7cfa8158bf7dd1dddf70c41fde081256c732468a4fb5c68354fe4fbe348e49b4dc5eb28bc623c14d7e84e68126356fdc8413523986705f41d6c8d99616d12f62312780edcdca0290e2a3d0594d6c562471516004a20e5f59bac1bd07a1f5e9695b2e9793163730f35eb1f6b86c49a6a19da96f6062a14a1d3c776f1892dc4c2392448f2508766ec5dda066d364d8170b527cbcb3adf2648201c2c146ec0253594a97077537ce477f00bd9a0fa6c8ad6fc568240e146da869d140db7759bbff1d6791c06333fab2835079e068abb93cb6336e9640de8e41a142cf9d04d34c89caa074500cf42f99634b6e6f6f9400d009ba8e01e380366b47bbfba50c19bf69b7f061e3ff4eed3859c70a0489d58660af4a4fdc5279fa611e0e872b96d8c659064efd9cc8d6db7c307737d6a77f1443ae70320aa5d5b47cb6d828438f32aa1efbce9b662fd8ebe455f7c6044e5e0a0579ce125e3fd8f0872bc1b845488a286609459d2c9628f5a82167574456317cfca919d6594350104bb16fea97df1c3dbb91e8cc6f04c9d9338dc8dbabc276beb72db9e57f57f5cd91f0bf862dbb25874fc3add9e14533dd72d2b45a50b7bb0a0d7dc301e73c5ddbcf4c97305da07da752704ab5ae3454fa44ad48a403422c67f8d10f196aa563147e5978e9463c283b52955ecc076b77492bec99fb8b6f4e39d2de493dc3575986711a651d7b1e8a3d57da9f43ad809289a915fb3bbb36fb1db2d48f5f838cad7993fa6ba19b6822a070c5f95767c53ea5fb7471081162c6e42cb52f0851a187eb10167ce47098a23ed8c1cafcfcf7eaf984131e49177c9c93609f527c378e65083dcecef40d375fb59882734f6b1ebcaace669c85d723519d7f2d3c8c287b4bef78fc20b71579e57b30d907cc621f67115dc936556bbd148c1a40a43a06f575291a0956a171c294a521e8553ad24d21f85e74938fe07b287bacc0150edd845493362d947262f2ada47468ab5b95fd738dcf2dfe8ee9cae92348f019ba1611d69f188124b7bd951f788b8a159e3f721bd2da5cfadebcab143f47a4121b80b55edccb2daf5a427772a1921c7651b3fb25a10672d7002d22e637ac1c42c451c2ed3bf27a55d7b214f2fb3a1a6550c2b7875ffce3744b0a47225e57a433909746547f473e440e0de4af50aecd2a7f1546d1204f5c85eb53059972479350cbe07c2d5640400ec355313b064a5101357b857c9d6204d9d37ee2bec065e3d150a2e4191dc8ddeec71cafeaaba3ce2bd855fe57c81fef33f65f958d2929a10c117137d4e3c835f27ae59e683388e8db0b6adee0597e11d05aefd0cd991feffbb479ab3da9241f2cd9d76ba38e85f25e41a40679fcb49e84d8c9946faa4e8e3f059fe60ebe3f3e17956d0607a5b431bd88bfdfea092de05cd07a3353d6a6447094f53540adc299e32799e2336403f57df361b493d1af8087ff12fd817f1e561e5e8d10d6f5ee9ea235a0aac939a7f7d2f1f8a6bc32e83b1f5819df7ceacc4934cff526cc05b974ccbb87328374f4b5703bfb0f8f7f6ce03acf7e5b1d812ff80aeed76fcc433ab57a0009de42f04ce6d6fd4b7306d76b3c7bcaf9514eeedadab085c229fe1098cda6753ba1832f855f3b3816e08a149239e5ff2ae3941660d2d77d7adce968de9bd3a48f01d365ebf49e08095c3058f7e67e0af68131c9d2da65129acfe61e284d06dd924f85661c933f66d235550c10c0a504fc290822bcc27e86bdf0f5f1f9d5569a51af0fa083565aa12506f86b8876948352829221e5596cc37d340904138382ce930ed974befc7f43e1172e9e215528c3a2c15edf2518035b77b547c9fe44f3eaf2bfa2f6e8cab1b35c009ea522ec2c8cff8ace122ac1b1e802ce45d5b30df3dcee38570774e1e7744211f8a661b35389669c72ca1906d1f0f05aec5bad1b3b7d46f1fcaf9da54abee9fd11d3b512b5a723f016ef0d8faa28bf39aef851c1142ddeeb4c88083f2a733d4988fbf40c19b0bc5d00dad3b9efd27e6a60d153d648f3e4d93342e38b52ecc44cfc39c5638727a928741bf93bbf7e8537b2719906a9d43b31877c1ad40fe098166c4822022085c0500fea49eee4e14beb531eeafe88c1b4e7d4abf1e79ad48514b815e12dcbb530dfd839418f68ccd9f9eac0a17bf07922bbb51b0ac064d6a25e8e8716e3dd719e60a8f964bab1f9ee1fc053be4e2e002f4650e4d28359a761f1b2fb68831dbd7e6169f18428d050996abfdee33a819a92062f8243e74971c8ecd872b60fdd6d10410ffe4ce576dda982beba3f44dbed6c990175bf97fa32a4842b9bdc341b4d7bc8701b05bb04d7cebff2ff7158475552ed2abee6df81a3cf7c6c9634711a2e0c5bd618d23d0f20990a4e4170c1c7a1e33fd2f49043f4ebe20eeaccb18ea6c74e015b623bee79295c909037ee3f649106eb18c101d0390bf18b0e1eae14d0a3268a1f6156ca5ad10997270416c9775b26447f95498526fbc2d500e557d0feb3a548fd357ec86515b06f7d97b1b5d15bb70445c32de09872280a52e2a62086e6fa538488f56fd3fea5887cb6d51dc170c023c6c48da321842f442cd11463522b2937690ca6510a169857e2abd1be1d6f6c8e02ed47dfc9f55792d6485477bed41c252815dcb0abc7a5d1f1ebf538dd707beab6cefbcc2857f5d821e01068087dafcb79268dc3f272e7ec4d29dfcf1f0d0d1dbf59e5b76f60d86d6514eb9ee546df20ff547f98c8837214521fa3274d086764634bfabab1513291b0b0f5c34a2d3d550aebfb6134e545ce6a97e7ed0becb84bb1f80885ac63266d644549a3e788811cdb2551acf8f845a08460e0c342af8f721328a1803d971b92921b11307933b9271e524e3958a56623a654bca0c3e28dd88be1c0d0b52962ada842fb39dc7b832b1f3effed5f1eaadb7cebe850f5c11882cf9e5d054f6b1512d19fb9f5a281c1d00e10b272856c70826216cf9d250612fde35af44125902b506dc4d89d744e4e44c7447dafaba3ef425277c445f1e08fd24032d640864d25345908ced3a97cd123e31b88acc51777b52bdf2e3e6837c4ffaf4baae76a54639ae8b6adfd8d9d6f760e4381b50709ca984b484f6d38774d0fa3433cc90a91704a87082f81945e4a7663b03070975bd3f04bf0f5d0b1b7c73ecaca82f594d969706a46cc023a86b52966b7b30c5d7b22186cd59e90f83975acdac105d250c775b136b8d1fbf24f0a658be566b0a1d6a269d402dcd8d15c738b1baf9643243ab450ef58e2626712e3e83bc6d03af911baf2e496825fcae2679ced210e38f950a9b9f92a00b9f41b4b38e42669b7d759033c17e8683051c9c640655896d96d48427168bae6cd50cb4e103362225a57d5ffa8e71f79aaf82b529408f4241522d3ad4124f9974a2cec33145a36a1a93f2cd6a2eb2f258f446aa097e771beaa30f45ba3873f43806a926f2d0c569cb5fe03ab4645b974cb6cf92c716456224bab5f9ba0e1a0c00d41559d75247ff3e790b06361357d400df10f4801445e7c59c88c33f4d05b59fd4e60824065578d75677bc5b79a4a16eb1048a4", 0xdcf}], 0x1) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="98000000000201080000808ac14ca86abe4b0003600003001400010000000000080002000000000914000101080001000000000708000200ac1414bb"], 0x1}}, 0x0) sendmsg$NL80211_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00.'], 0x1c}}, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x40, &(0x7f0000000140)={@initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 07:01:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000003ac0)={&(0x7f0000003a00)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000003a80)={&(0x7f0000003a40)={0x1c}, 0x1c}}, 0x0) [ 2151.509269][ T7291] loop5: detected capacity change from 0 to 255 [ 2151.521987][ T7291] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2151.537894][ T7291] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2521/file0 supports timestamps until 2107 (0x10391447e) 07:01:07 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x0) sendto$inet6(r0, 0x0, 0x0, 0xfffffeffffffffbe, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:01:07 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a02000274fef801", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:07 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020224000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40001, 0x4, &(0x7f0000000200)=[{&(0x7f0000000180)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) creat(0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) 07:01:07 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f0000006e00)=[{{&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000002040)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, &(0x7f0000006f40)={0x77359400}) 07:01:07 executing program 2: r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x3e) fcntl$setsig(r1, 0xa, 0x12) r3 = epoll_create1(0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) epoll_wait(r3, &(0x7f0000000040)=[{}], 0x1, 0x1000) poll(&(0x7f0000000000)=[{r2}], 0x1, 0xfffffffffffffff8) dup2(r1, r2) fcntl$setown(r2, 0x8, r0) tkill(r0, 0x14) 07:01:07 executing program 1: mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) 07:01:07 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f802", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2152.365612][ T7319] loop5: detected capacity change from 0 to 255 [ 2152.389198][ T7319] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:07 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f803", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:07 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020254000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2152.406614][ T7319] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2522/file0 supports timestamps until 2107 (0x10391447e) 07:01:07 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f0000006e00)=[{{&(0x7f0000000a00)=@abs, 0x6e, 0x0}}], 0x1, 0x0, 0x0) 07:01:07 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f804", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:07 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2152.477806][ T7350] loop5: detected capacity change from 0 to 255 [ 2152.488914][ T7350] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2152.512251][ T7350] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2523/file0 supports timestamps until 2107 (0x10391447e) 07:01:08 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f805", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:10 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020484000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:10 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x4000, 0x0) 07:01:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:10 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 07:01:10 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f806", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:10 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000000c0), 0xfff, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) 07:01:10 executing program 4: syz_open_dev$rtc(&(0x7f0000000040), 0x1, 0x440) 07:01:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:10 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f807", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2155.433502][ T7375] loop5: detected capacity change from 0 to 255 [ 2155.456844][ T7375] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:10 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0, 0x0, 0x0, 0x40000000}}], 0x4000000000003be, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x8, &(0x7f0000000000)={@local}, 0x14) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 07:01:10 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = socket$inet(0x2, 0x3, 0x14) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000180)=ANY=[], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000140)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000540)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x11d51, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xf, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x28031, 0xffffffffffffffff, 0x0) sendmmsg$inet(r1, &(0x7f00000011c0), 0x0, 0x20040000) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000002c0)={@rand_addr, 0x0}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={@private0, @local, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9ea, 0x57, 0x5, 0x500, 0x100000001, 0x0, r2}) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x20800, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x18, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x90}, 0x8000) syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') 07:01:10 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0xfff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='totmaps\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 2155.491432][ T7375] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2524/file0 supports timestamps until 2107 (0x10391447e) 07:01:10 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000204c4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:10 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f808", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:10 executing program 4: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000002f80), 0x0, 0x0) 07:01:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:10 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000006f40)={0x77359400}) 07:01:10 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f809", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:10 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:10 executing program 4: syz_genetlink_get_family_id$nl80211(&(0x7f0000007100), 0xffffffffffffffff) [ 2155.625111][ T7425] loop5: detected capacity change from 0 to 255 [ 2155.642478][ T7425] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2155.684228][ T7425] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2525/file0 supports timestamps until 2107 (0x10391447e) 07:01:11 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x10}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in=@private, 0x0, 0x800, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x2, @in6=@private0, 0x0, 0x4, 0x0, 0x81}}, 0xe8) recvmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001740)=[{0x0}, {0x0}, {&(0x7f0000000340)=""/132, 0x84}], 0x3}, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 07:01:11 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f80a", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed005400000000023ec13e20002000000100"}) 07:01:11 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x0, 0x0, {{0x30}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 07:01:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:11 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020604000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:11 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEAUTHENTICATE(r1, &(0x7f0000000500)={&(0x7f0000000400), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x24, r0, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_SSID={0x4}, @NL80211_ATTR_REASON_CODE={0x6}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}]}, 0x24}}, 0x0) 07:01:11 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f80b", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:11 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x10}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in=@private, 0x0, 0x800, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x2, @in6=@private0, 0x0, 0x4, 0x0, 0x81}}, 0xe8) recvmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001740)=[{0x0}, {0x0}, {&(0x7f0000000340)=""/132, 0x84}], 0x3}, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 07:01:11 executing program 4: creat(&(0x7f00000002c0)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f0000000040)='./file0\x00', &(0x7f0000001880), &(0x7f0000000000), 0x20, 0x0) llistxattr(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) [ 2156.454688][ T7463] loop5: detected capacity change from 0 to 255 [ 2156.481870][ T7463] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:11 executing program 2: socketpair(0x0, 0x42d78b0662bb5f9c, 0x0, 0x0) 07:01:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:11 executing program 4: io_setup(0x40, &(0x7f0000000080)) io_setup(0x1ff, &(0x7f00000001c0)=0x0) io_setup(0x2, &(0x7f0000000040)=0x0) io_destroy(r1) io_destroy(r0) [ 2156.528328][ T7463] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2526/file0 supports timestamps until 2107 (0x10391447e) 07:01:11 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f80c", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:11 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x10}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in=@private, 0x0, 0x800, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x2, @in6=@private0, 0x0, 0x4, 0x0, 0x81}}, 0xe8) recvmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001740)=[{0x0}, {0x0}, {&(0x7f0000000340)=""/132, 0x84}], 0x3}, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 07:01:11 executing program 2: mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x43, 0x0, 0x0) 07:01:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:11 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020684000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:11 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f80d", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:11 executing program 2: add_key(&(0x7f00000000c0)='dns_resolver\x00', 0x0, &(0x7f0000000140)='W8', 0xfffff, 0xfffffffffffffffe) 07:01:11 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x10}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000400)={0x0, 0x3}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in=@private, 0x0, 0x800, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x2, @in6=@private0, 0x0, 0x4, 0x0, 0x81}}, 0xe8) recvmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001740)=[{0x0}, {0x0}, {&(0x7f0000000340)=""/132, 0x84}], 0x3}, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 07:01:11 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f80f", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:11 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:11 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bind$netlink(r0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x2, @in6=@private0, 0x0, 0x4, 0x0, 0x81}}, 0xe8) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) [ 2156.702740][ T7514] loop5: detected capacity change from 0 to 255 [ 2156.711641][ T7514] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2156.721588][ T7514] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2527/file0 supports timestamps until 2107 (0x10391447e) 07:01:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x1, 0x8, 0x101}, 0x14}}, 0x0) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f810", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000206c4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:12 executing program 2: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file2\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb06906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000140)="57bbbe7e43c6000000afc681595a4b414c4c455220a0085ac19febb9d93fabfbed6fda7f00bfce426791fc9426cdbdad8a982a3d", 0x34, 0x612}, {0x0, 0x0, 0x10e20}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='iocharset=macinuit']) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) 07:01:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in=@private, 0x0, 0x800, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x2, @in6=@private0, 0x0, 0x4, 0x0, 0x81}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 07:01:12 executing program 4: mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, 0x0) 07:01:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f811", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2156.901541][ T7536] loop5: detected capacity change from 0 to 255 [ 2156.935740][ T7536] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:12 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in=@private, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x0, @in6=@private0, 0x0, 0x0, 0x0, 0x81}}, 0xe8) recvmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001740)=[{0x0}, {0x0}, {&(0x7f0000000340)=""/132, 0x84}], 0x3}, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 07:01:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x10000001000}], 0x3014014, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x8800000) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r1, 0x80104592, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x101, "ed005400000000003ec13e20000000000100"}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000300)="88", 0x1}], 0x1) 07:01:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2156.957022][ T7536] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2528/file0 supports timestamps until 2107 (0x10391447e) 07:01:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020744000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:12 executing program 2: sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, 0x0}, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x42a81, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, 0x0) ioctl$SNAPSHOT_UNFREEZE(0xffffffffffffffff, 0x3305) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f812", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:12 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffff7fffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in=@private, 0x0, 0x800, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x2, @in6=@private0, 0x0, 0x4, 0x0, 0x81}}, 0xe8) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0x0) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f814", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2157.148388][ T7575] loop5: detected capacity change from 0 to 255 [ 2157.166845][ T7575] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2157.188208][ T7575] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2529/file0 supports timestamps until 2107 (0x10391447e) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f825", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:12 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 07:01:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:12 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1b9c) 07:01:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020784000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f84b", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCGETA(r1, 0x5401, &(0x7f0000000080)) 07:01:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:12 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8fe", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:12 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfc, 0x10}, 0xc) r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in=@loopback, @in=@private, 0x0, 0x800, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x3c}, 0x2, @in6=@private0, 0x0, 0x4, 0x0, 0x81}}, 0xe8) recvmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r1, &(0x7f0000000480), 0x2e9, 0x0) 07:01:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCGETA(r1, 0x5401, &(0x7f0000000080)) 07:01:12 executing program 4: syz_open_procfs(0x0, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5409, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) preadv(0xffffffffffffffff, &(0x7f00000023c0), 0x0, 0x0, 0x0) close(r0) pipe2(&(0x7f0000000100), 0x800) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) [ 2157.511955][ T7614] loop5: detected capacity change from 0 to 255 [ 2157.533559][ T7614] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8b9", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCGETA(r1, 0x5401, &(0x7f0000000080)) [ 2157.577259][ T7614] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2530/file0 supports timestamps until 2107 (0x10391447e) 07:01:12 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000207a4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:12 executing program 4: syz_open_procfs(0x0, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5409, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) preadv(0xffffffffffffffff, &(0x7f00000023c0), 0x0, 0x0, 0x0) close(r0) pipe2(&(0x7f0000000100), 0x800) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) 07:01:12 executing program 1: pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) sendmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:12 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:12 executing program 4: syz_open_procfs(0x0, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5409, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) preadv(0xffffffffffffffff, &(0x7f00000023c0), 0x0, 0x0, 0x0) close(r0) pipe2(&(0x7f0000000100), 0x800) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) 07:01:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCGETA(r1, 0x5401, &(0x7f0000000080)) 07:01:12 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)}, 0x0) 07:01:12 executing program 4: syz_open_procfs(0x0, 0x0) r0 = socket(0x80000000000000a, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5409, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) preadv(0xffffffffffffffff, &(0x7f00000023c0), 0x0, 0x0, 0x0) close(r0) pipe2(&(0x7f0000000100), 0x800) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x218, 0x5000000, 0x0) 07:01:12 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2157.736249][ T7659] loop5: detected capacity change from 0 to 255 [ 2157.760515][ T7659] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:12 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) 07:01:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@cred], 0x20}, 0x0) getsockopt$sock_int(r1, 0xffff, 0x1001, &(0x7f00000007c0), &(0x7f0000000800)=0x4) 07:01:13 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020fb4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000080)) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2157.786334][ T7659] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2531/file0 supports timestamps until 2107 (0x10391447e) 07:01:13 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000000c0)={0x1c, r0, 0x1, 0x1000000, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 07:01:13 executing program 4: fcntl$getown(0xffffffffffffffff, 0x5) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 1: semctl$GETPID(0xffffffffffffffff, 0x0, 0x4, 0x0) 07:01:13 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="24000000210007041dfffd946f610500030003e8fe02080100010800080002000400ff7e280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2157.939411][ T7700] loop5: detected capacity change from 0 to 255 [ 2157.971009][ T7700] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:13 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020fe4000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:13 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000100)={{0x0, 0x0, 0xffffffffffffffff}}) 07:01:13 executing program 1: socket(0x23, 0x0, 0x7) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 4: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2157.999491][ T7700] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2532/file0 supports timestamps until 2107 (0x10391447e) 07:01:13 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@cred], 0x20}, 0x1) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2158.075444][ T7735] loop5: detected capacity change from 0 to 255 [ 2158.099636][ T7735] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:13 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) fcntl$getflags(r0, 0x0) 07:01:13 executing program 1: mkdirat(0xffffffffffffffff, &(0x7f0000000280)='\x00', 0x0) [ 2158.121712][ T7735] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2533/file0 supports timestamps until 2107 (0x10391447e) 07:01:13 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000c000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 1: pipe(&(0x7f00000022c0)={0xffffffffffffffff}) connect$inet6(r0, &(0x7f0000002300)={0x18, 0x3}, 0xc) 07:01:13 executing program 4: semctl$SETVAL(0x0, 0x0, 0x8, &(0x7f0000000080)) 07:01:13 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000000200)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) 07:01:13 executing program 2: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2158.259945][ T7774] loop5: detected capacity change from 0 to 255 [ 2158.288539][ T7774] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000000200)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000000400)}, 0x0) 07:01:13 executing program 2: connect(0xffffffffffffffff, &(0x7f0000000000), 0xe) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 07:01:13 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200080ffff0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 4: getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) [ 2158.324738][ T7774] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2534/file0 supports timestamps until 2107 (0x10391447e) 07:01:13 executing program 2: readlinkat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@cred], 0x20}, 0x0) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000000200)=[{&(0x7f0000000040)="06", 0x1}, {0x0}, {0x0}], 0x3, &(0x7f0000000400)=[@cred], 0x20}, 0x0) 07:01:13 executing program 2: lchown(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) 07:01:13 executing program 4: getpeername$inet(0xffffffffffffff9c, 0x0, 0x0) pipe2(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readlinkat(r0, &(0x7f00000007c0)='./file0\x00', 0x0, 0x0) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="06", 0x1}, {0x0}, {0x0}], 0x3, &(0x7f0000000400)=[@cred], 0x20}, 0x0) [ 2158.455449][ T7816] loop5: detected capacity change from 0 to 255 [ 2158.490596][ T7816] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 4: madvise(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x2) 07:01:13 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020000900000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:13 executing program 2: clone(0x10291c80, 0x0, 0x0, 0x0, 0x0) 07:01:13 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x89a0, &(0x7f0000002280)={'wpan1\x00'}) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2158.524972][ T7816] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2535/file0 supports timestamps until 2107 (0x10391447e) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 2: openat2(0xffffffffffffff9c, 0x0, &(0x7f00000002c0)={0x240000}, 0x18) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 4: sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) 07:01:13 executing program 1: open$dir(&(0x7f00000001c0)='./file0\x00', 0x140, 0x0) llistxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x3c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) [ 2158.660735][ T7859] loop5: detected capacity change from 0 to 255 [ 2158.670969][ T7859] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2158.695481][ T7859] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2536/file0 supports timestamps until 2107 (0x10391447e) 07:01:13 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020001300000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:13 executing program 4: openat$urandom(0xffffffffffffff9c, 0x0, 0x412080, 0x0) 07:01:13 executing program 1: add_key(&(0x7f0000000180)='logon\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000001500)="88", 0x1, 0xfffffffffffffffc) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:13 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:13 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000480)={[{@shortname_lower}]}) 07:01:13 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x6000) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x6) 07:01:13 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x1dda, &(0x7f0000000080), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ee9000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000180)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r3}}, 0x0) capset(&(0x7f0000000100)={0x19980330}, &(0x7f00000001c0)) io_uring_enter(r0, 0x393c, 0x0, 0x0, 0x0, 0x0) 07:01:14 executing program 2: socketpair(0x1, 0x0, 0x101, &(0x7f0000000000)) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2158.849870][ T7895] loop5: detected capacity change from 0 to 255 [ 2158.876247][ T7895] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020001400000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:14 executing program 1: syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0xe19383) 07:01:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)='keyring\x00') 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2158.905833][ T7895] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2537/file0 supports timestamps until 2107 (0x10391447e) 07:01:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x15, r0, 0x0, 0x0, 0x0) 07:01:14 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='ip6erspan0\x00'}) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2159.002269][ T7918] loop5: detected capacity change from 0 to 255 [ 2159.041002][ T7918] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2159.061260][ T7918] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2538/file0 supports timestamps until 2107 (0x10391447e) 07:01:14 executing program 4: clone(0x80081b00, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000001100)="b4") 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 2: syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0x80000000, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x1c7002, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) 07:01:14 executing program 1: clock_nanosleep(0x0, 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0) 07:01:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020002700000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:14 executing program 4: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.cpus\x00', 0x2, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000100)='\n', 0x1}], 0x1) 07:01:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x3, 0xa0041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x2e}, @cond=[{}, {0x0, 0x0, 0x0, 0x4}]}) write$evdev(r1, &(0x7f0000000040), 0x2a0) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f", 0x1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xf, r0, 0x0, 0x0, 0x0) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:14 executing program 2: syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) syz_read_part_table(0x0, 0x0, 0x0) [ 2159.186470][ T7954] loop5: detected capacity change from 0 to 255 [ 2159.212577][ T7957] new mount options do not match the existing superblock, will be ignored [ 2159.226315][ T7954] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="3c754c39ec1eea41aac2e84c0c663a2a66b8f8aaedd66a123dbc169c5499c86565137e354904ebf23b0526771bff7cee5c85140ce602841f0ab9ff809891fcdc0ffe09e7e4252d8e76cca80f2666a4ddd90b21da94fa9be5b01f9ee4b6f962e405e3542c622ee18521a9e0193fd6596db5fe60b3b17584d288ff", 0x7a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:14 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="6653070000010000e7b126b097eaa769be6d05c41bd34e677d114b654b4993d35f010432c7ea63930ba87321b274a80467807b703ab0c4e13ccb9605708906a13ec7a81417ce7662df0068e5901e20ffb30505dc82930be1c6ade9bfcfaad5804a5badafa0dc39a9d632100b081a6752182ed5963eb2e69bed3330350d4ad585a2b6ca9501a19218c01776c5e1c699de6a8ba0ea27a8fea154e9d9bab4f7535701fae64a38997b91824f59aff08757e5ee4da5626f44e5820f0bb2164a6b9e10b6c1615b6ba2bf7e9e3976ecd70d2ba03299c1070c1b73e9786f1e4a6cc5558df3285a306ed3f8d0d3dc4c6126c4df91e28cf2fccbe3b01768e53ab97deab8f35d52bc00a2759fc735030c6ec8fa4f2d61b3b5f19716295d32b66310dfe38d1c0ad4d68678d31ec4334100832c700f7ef194fba935bd36c733df3154af0e611da14ed31b45bbfef45c9f8c9b7bc087bab6e8d5cdfc719521588c58561bade2c6a51cf7cbc3faccfb1936a048dc3c1d68c1a6028261de17295997acc3cc0fd3d76f5681149a82a06ac78acbeaeb47ad5898d30fc0fae20fa5e8ea49d7739620a5a19d8095517710b27f64fe6f843650a5a00777373dfe0d7915c2f698bf431698995698e7d5bebd5b827e67520ad961ed60451a4affd3739e99fa559d566df07168613d9c2e97aaac9b3d7289fa1f57a6ac95df5e07b587f739ab56f2a541fa87da8a758607c7e3650f762bc4a62f1273acc8ac143bb5f9374a3ca6e38df3cc942d72a874ffb6988fa0415167529b52709d93b447507c666e20608005ecda6fb20fb715623ad011fb640b870083438a770778b3277b9e08c8cc415d1e1a2ec9d5e79a42", 0x263}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0xffffffffffffff26, &(0x7f0000000100)={0xfffffffffffffffc}}, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 07:01:14 executing program 2: syz_io_uring_setup(0x40004458, &(0x7f0000000180), &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000200)) [ 2159.247828][ T7957] new mount options do not match the existing superblock, will be ignored [ 2159.263100][ T7954] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2539/file0 supports timestamps until 2107 (0x10391447e) 07:01:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020002800000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8fe", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\xd2', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(r1, r0) 07:01:14 executing program 4: execveat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0, &(0x7f00000004c0)=[&(0x7f0000000300)='^$[/\\.\x00'], 0x0) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x4, r0, 0x0, 0x0, 0x0) 07:01:14 executing program 4: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x3, r0, 0x0, 0x0, 0x0) keyctl$link(0x8, 0x0, r0) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2159.404448][ T8011] loop5: detected capacity change from 0 to 255 [ 2159.433989][ T8011] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:14 executing program 4: migrate_pages(0x0, 0x3, 0x0, &(0x7f00000000c0)=0x9) 07:01:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffc, r0, 0x0) [ 2159.453607][ T8011] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2540/file0 supports timestamps until 2107 (0x10391447e) 07:01:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020002900000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:14 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/ipc\x00') 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:14 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000004b40)=[{0x0}, {0x0}, {&(0x7f0000004900)=""/166, 0xa6}], 0x3, &(0x7f0000004c40)=[{&(0x7f0000004bc0)=""/110, 0x6e}], 0x1, 0x0) 07:01:14 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x40451, &(0x7f00000002c0)) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 1: execveat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x100) 07:01:14 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x7}, 0x0, 0x0, 0x0) 07:01:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/nf_conntrack\x00') readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/100, 0x94}], 0x1) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f800", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2159.601367][ T8054] loop5: detected capacity change from 0 to 255 [ 2159.629818][ T8054] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2159.646205][ T8054] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2541/file0 supports timestamps until 2107 (0x10391447e) 07:01:14 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020003100000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8f2", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:14 executing program 1: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) 07:01:14 executing program 4: openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x20040, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, 0x0) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:14 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x11, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0) 07:01:14 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 07:01:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000600)=[{&(0x7f00000002c0)="eb3c8f000000732e66617400020101000240008080f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') open(&(0x7f0000000100)='./file0\x00', 0x40c2, 0x0) 07:01:14 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8f8", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:15 executing program 2: request_key(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000380)='/dev/sg#\x00', 0x0) [ 2159.804618][ T8086] loop5: detected capacity change from 0 to 255 [ 2159.820277][ T8086] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020003200000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8f9", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000001340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001300)={&(0x7f0000001380)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@TIPC_NLA_LINK={0x68, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0xe3c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xe35, 0x3, "d538eb4b3abd29a74b11b20e2e241216af11a807d51b3e96ccc7b7afdb651a261ae9c23ad635a4a58a1b024a07539e016f356ac04fc2d439a6d3dddf0e51866130f7ebb0eb96f88e2c5acddb762b737d9c51f36c87328ada3b1c2cb4785a1f35f2e555620cdf77f8798c0939f4dee6628df5033cbd1f00a92106d3df2636f2edb8791f5fda9af8ce6a9613f069bc9135993f1af84b898c8545fe6d7e58001a59c8f77d128291b22042a23a711269d63eddfe6eaa8263944488df58bb199c91057b2010a7a6d2511290be5f0d9720eb3edb16e35e28a8717def322a8257226f3b080377b766ac18e8ebe6a21862c418473d3790cdff466cb981ec29ed6f86062379a8f8484f3b11140e78729aabce8cab825196d9a6cc28d684a27e691a38cf3a03c0b6e5ab0258eb5dd08600573fe98977dda405cf080556290ea1cd7b930881d27362ca96764e753b24755301d4ef64b6e513df83ebbf1ce138abf5a646b328838b4455e71b761f28042fd994b82425b6ed5fa0c58432ae195454e877413b7cef87507137efbc5f0a9575437bb2d34e71cedfc11fb113bb0893a644613db818fbdf1df7a34bb42cc7404a45b6a1a3191abea8aa6e7c2b2a85504242a71cd88011405f01fd08d81179ecaa7027525b8fe25cad5bf17180dc8fee086e8c14995c6f2cb8b57e545bd54eedf504685fd0278705842c84076e64c2cfd2a03deb19185e31b96912d7c47412c57ff916e715e32450a37c7b65a86a27d42510eed52b26ec6a7ef975d9cf5495ff9c3bcb775e829405eac614ed1516c09f7b65ba61d7ba517c978cb094b82fc291c2ed3228184f3d54d5aff9d65d6adc64606f8aeea7c49da2314d9dad930a2e9346d919b85d62392c931a7125b143e7e0b40a3fafde3e0e782836d56929bcc91c9e5b3c1642aab15a489f340b296332e8758495011304455d7ecb5817403f16d66e1c6fd5ba5569ee4ba4292d25ef48f3f5c3a0d5d696fe6f21b48ae575a4b78e8937218d7e6676147d1c21fdb2f9184dcbd0a61940130902bc88f5ea40eb72a3de712a1e49339c8a25033f0bd9a1d4bc6c4d0482b8981f041807be3628b006fd41e5091329f717ccdb3ccca71b4d546b819996a7ed910334f84a4ecd78392886e1bc31da14063dcfc8a6a1e756be86c082f35d3bb267860bbd51722dd601fc62b8de29d3a815f2e24a96d31c4d3a1cec7f3174384b92f8359c25eb0bea6be24efe0c3e169a2915337bd71ac58417adacfc6012e9f26123ef113e1dc9100f136de10b492838561cb27df73edbc052cb6be91aef4498151d1424df1682816487a83b77588565caea593c02b618342277c2cb156222fd3ee0ae4433bfa04d4ef478cc8a7cc4fa8c845d10e638bc938ef80b7701795c0a6dedc786b40cdd5dbc8f8e9147837a67b2e2e9c4dc3909a6487e18e740aee3364512b981c94ef437a1e21f0122eea89bd357c8af8683e961ae014940e801e1943b3876ced944a4b89539ffdba8ecf137cfeeb18feabccfa9072731f46dd0ca368333f58547fafdbca5ac7bc4ea532e62396c0a384159e09199d1cf03f5ca43eb0746ab4b5d6e979160ff9be696188a1b70e39bb1178a93751140075eede16a3c8693942cf1b0e919191749e7c7d7716b86660db5252c32dfd0ae8fd39b6c21e38ad3b33e2e8cf60a82e48d581c420793d56af3c31eb573ec5dc9e818c566004a036d1ba7daaf4a2362b5be9ce5cdc085366a74c9b55871e3342ea8820b395a030805ac93e65062795daa9767b318bc06bcc73567bac035418fa505122648977fad1060b41df37a48bd1eed3557156938a0335e5eaaf674e48095d7e3a2f8c43e9943797d396bf88e183d8b81617680480a50b593efd6f69ed1e205cf82c22c0541d2ab3985d4fcba1cab05a21f8b19fed30d59f8c452d49e906118c9c96c0cc6823e8512f6778191989712b40c08f43a03d422e8180489e4e6cb81347c3e051b1fa5dbe600e502cd9e9821c38fc7f6717a555c3aced807a8a0da993d44038ad8f192245f28520234dc33666efd6e1536d56d1d4a124bd931266f64becd548e9a8b0b0618af2a9fdfcfabc7f457dc00296037e8f2c19f3361d00eb21eaecfc021a8257bb2e67f6980f6a20fb3cc3472b01fba83a4d2c110b544c894b156f7b1d224d0ec147d3d419ac938e17d6bacae6269064d636b35289cc07fea03977912a7194f78911e4a44c2d8f862615f66f251c2f7535fb6f5ff878623b48dfbbd81ee35d2d76a9fcd33b32e5f734c53fc2adfe72a9687738e7a44383492455102c25e108d8f2246b98a7680b0633ab87108e01e4aed0b96e0d83092e2d7fbb6ee9c2f7279a2fb2dbcbd1e1ee5a62a216e76d50ad035c6a2cf8e0af4cf8c8f945afe7aa56fdaa435cc95ac541c9e84907265c445fcca65b809e49b05ac365b38405a1c7d81b97ab8aadd3a31c255fbd75770ff7d27bd1ea3439fb120d609b5d6c11986bdf463daa3abb94d7919f67af6203b4788b6dba1de195f392e8675ab20ed17fd84d2f9b130c9cc929ad121b0f35e8b863c18940ac9f02a9e64b251a7e36cf6b1cf84ad2712b5588a527e1bcfd057fe49128d182ee98f2d79f0807a6d9bb969fb566f8b3ab0186f5c321d8a67a5b7c43eb66a39922ad50fc35933719a95ea7bd8ef48deb37bedd737632669e95abb3b63926eeb3919ba9d0a0b589305327cb0a22397c727778e6ef16d1d6438723736a780280c92d2235b8e0124b529ed4d74b7a8b50abb9a9e89aab5f972ac1bad58d187fe679ff60a6b260e6ce568f19d39e802ca0fc0dd3a9a7c32186143632d7b5ef09f69d17f418fc305b2f7d239dd7390a4590dbd03a6103e49419a997ccc3393dc1a2f32b3aa53592713573b7d80f82dd9ac1503f4e14e3b6d95f4721a3624ed6aa11c0cfc0afaf201fe90ee0582f817924231433569d0f9492ca6a883e39556e9b8766fc646172999049dca9e9179a76f8d3fffad5210241b003446a20d6a88b6d9145efbc0cdb325c6cfe15f5689e80ea27fb6cf6c70d9fc3ab0dd46444de5df3cab4ae9a38a98b74d2901636d6354b20b000a845d7c75036db9f26c25ce729977f77d1d7716f51421aa5ff5f3256c795793ac6006d789ee75710826172d5ce13e3c7d4915e3c2df483fc3afde0c685e1721ae588080ecd671a79ddaf97d5833f0d6a5a1b66a2c5e09141731005deed7939b968e3c60ada8acdc1840afb27d61da1faf8d92b0040ed6d12ef37b46d802b7be64ff4857a876c698e7aee3453d29a411ce0cd87c53e8a3f02db37452a26e231bd5b6d9442bb557f967467681753f4f61d487d41af0d053e17d6a9c6a534a4d92191b809491428f7e93ead9d8015d4a2f1e190c8c3faa91ab5534ba0aee5bb08a4428c75368854677c23feaddc601a3ad49a7f90ad48b4de194493df61c698c64beff412ddc17d31dfa5962b775e1cb39e99ab2d76df67ddb54acd52024e225b1a7968cd448139f885017b931dbd6b3e9be826fc930bd5f0f06f3a2ef1da5c0f2b76b214d46e94932997eea419fd74a503a68f68b8b446977da1a8a9ba1effb174d340fa7d74ac342864f68a7dd17e4266dbae9cb61d25dd5c966b5675a326b95ba4e163c66fd8082ecdc4c4cced66a57b56f6a6e66145b2f8985e7cb47073965ef08a754af6c49e7545a2ed24342d8f49b16459d4adead293344b90626cf4c0d647b971364326aed5e499d2f476e7a7f45c46fdabca499cafb14e306b2ad724e23ff6748f9d49f03c58b59a7759078bc874f22ba556716347d4538026f0832e7e2b278f3540032f66578df93dfd4dffc2a05176ac7e1b49ebc8cd209260321cbe63caad6f26e2bc47d62165ed7fef683ad686440f90fe281e7a7a1a2407e566ab92af249c66b6e3d564a4087ce59500bdb5bf6b90593134a9507e23ff4abd754d598e56c8ef9fe5be3ffe8fd3519e77834c54a04bcf9f522377974d42134aa9086739273b9d64366fbe1931148996ee9dfd031d91bae3c4331cae9b4abe5f718b035ef5644d7bcf909820340fe38dede06a573d4b3b980611855b71caad7dd6f83d777f346f6bbc56ae3f7366700eefc9af62c9b213b0399e0d9907632fe2cdf7e8e1c1750823d8178de59203056bf405bfb7cbb309dc5ccb63adefb1599ac4d7361944e70ac607e7af4c7ad41bf6a076eb7cd69c3a8e1af6101e232de2c67f917ab9aa8ad575f48889564d366713240e4f3c9ea81831a80f8376d05b987893bab75bbccc64087a5c0d28467a3e32c9f11b335c6d4144c028694405cf05bbd0f0a1d89d2d0d8b10da4f7bf5720c0e4c1ef876f53630cd45207b9200de05acb8f0fc19992185b82453af1ab50abd51e6813f63dc33019e649599dd1b0b6098c2654001d77c365e0d6c21c0c898cf5363281a6c17b9bae4f9614941ea430f94f2c12154c4b1e76fb07b081fd94348efd4a2a6ca3d8c5a3cc852c1f4a5268d396a94ab1339299a1bdf0752d265f4c9c56e14ee9fc822cabb1c60760aaa12869bbae4902502c2779841a27e50d213ded8e4764b9fede2c1dd694c234fbed7d8dcccf8205ca319b2e953ff9ff312aa158acacbe8685564d47215b5d6b9c1781d9c0553f4b3bc3be2087e00b51dee2953244108ace301133dc7504eaf8d4f470d6ca0e518aa68ac7060ab17a66271f31d058e815228850b485766d997600e65a428bcbfe995e62c28ed052b51e17f70bd7de78f7730193a2fadc6aecdb94ebce013fd793053f032e9e573d949a24a00a071467814ab9220bd6af76dea45b0134644a0cca67134f74990a3295fd9253bd177284f15c1a09441399338025551fc9de1f83bebce05daf080ac766c03193ecd7bc75797b8b4f41d6e5efbb5fe1d14444b506173e3f415ae8a5bb480aa1a9d90648c153bcd704e6a8db9d6fde02b7f91a5d111fdbac44d4e8e34077ba6a62ee6b8a67c5afa0eb6c9fc7761889756328cd372a3bda9ed5d88ac99a3ab68ccd6d401a1c51bc066b6184ed3d1ae94df47b417fb7721e1da0bd945af0f9b1a615b4dadd39c61ff36a32a8b66cb35d99064c98ca7094afca35a714cdff03fe4a67578d826fbec783dfe5dc0ec9892224d17f94128aeeb340c8d3299f9d3c714338cffba0"}]}]}, 0xec4}}, 0x0) 07:01:15 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c1f", 0x9e, 0x8c60}], 0x0, &(0x7f0000010f60)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000140)=ANY=[@ANYRES32=0x0]) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2159.861145][ T8086] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2542/file0 supports timestamps until 2107 (0x10391447e) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8fe", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:15 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000001c0)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 07:01:15 executing program 1: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.cpus\x00', 0x2, 0x0) writev(r2, 0x0, 0x0) 07:01:15 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2159.995394][ T8122] loop5: detected capacity change from 0 to 255 [ 2160.024822][ T8122] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8ff", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2160.046033][ T8122] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2543/file0 supports timestamps until 2107 (0x10391447e) 07:01:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000c000000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f8fe", 0x17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 2: madvise(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x13) 07:01:15 executing program 2: madvise(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x10) [ 2160.110475][ T8138] new mount options do not match the existing superblock, will be ignored [ 2160.135588][ T8138] new mount options do not match the existing superblock, will be ignored 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2160.175948][ T8153] loop5: detected capacity change from 0 to 255 07:01:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 07:01:15 executing program 2: socketpair(0x26, 0x0, 0x0, &(0x7f00000000c0)) 07:01:15 executing program 1: clone(0x0, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000200)="963ce6c13a0b3c3a97256a38b7943d34b38a51715305a52805cc5a5f550c523899502ce8c65fa8275f27764aa7b65dd53f73617a17e97d70f2d022d04705218f26a8f369953c") 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020000000200000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2160.227846][ T8153] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2160.252932][ T8153] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2544/file0 supports timestamps until 2107 (0x10391447e) 07:01:15 executing program 2: socketpair(0xa, 0x3, 0x9, &(0x7f0000002ac0)) 07:01:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x3, 0xa0041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x2e, 0x2}, @cond}) write$evdev(r0, &(0x7f0000000040), 0x2a0) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x4}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 4: request_key(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102385, 0x18ff1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2160.351120][ T8184] loop5: detected capacity change from 0 to 255 [ 2160.360390][ T8184] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2160.370418][ T8184] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2545/file0 supports timestamps until 2107 (0x10391447e) 07:01:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0\x00') 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102385, 0x18ff1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x5}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 2: socket$inet6(0xa, 0x0, 0x80000001) 07:01:15 executing program 1: mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0x3) 07:01:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004002000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:15 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xf, r0, &(0x7f0000000080)='asymmetric\x00', 0x0, 0x0) 07:01:15 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000001040)=[{0x0}, {&(0x7f0000000040)=""/4096, 0x1000}], 0x2, &(0x7f0000001580)=[{&(0x7f0000001080)=""/174, 0xae}, {&(0x7f0000001500)=""/34, 0x22}, {0x0}], 0x3, 0x0) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x6}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102385, 0x18ff1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:15 executing program 1: ioperm(0x0, 0x20, 0xcb) ioperm(0x0, 0x6, 0x0) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x7}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2160.538048][ T8214] loop5: detected capacity change from 0 to 255 07:01:15 executing program 1: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102385, 0x18ff1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000100)={'vlan0\x00', &(0x7f0000002fc0)=@ethtool_link_settings={0x3}}) 07:01:15 executing program 2: futex(&(0x7f0000000240)=0x2, 0x0, 0x2, &(0x7f0000000280)={0x0, 0x3938700}, 0x0, 0x0) [ 2160.587792][ T8214] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004003000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x8}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4004040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102385, 0x18ff1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2160.638563][ T8214] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2546/file0 supports timestamps until 2107 (0x10391447e) 07:01:15 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x4280) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102385, 0x18ff1}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:15 executing program 2: futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000580)) [ 2160.759707][ T8263] loop5: detected capacity change from 0 to 255 [ 2160.770737][ T8263] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:15 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:15 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:15 executing program 4: prctl$PR_GET_NAME(0x10, &(0x7f00000003c0)=""/4096) 07:01:15 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004004000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:15 executing program 2: mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x7fffdf004000, 0x0, &(0x7f0000ffc000/0x1000)=nil) [ 2160.800608][ T8263] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2547/file0 supports timestamps until 2107 (0x10391447e) 07:01:16 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xb}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2160.887259][ T8283] loop5: detected capacity change from 0 to 255 [ 2160.897128][ T8283] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2160.906940][ T8283] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2548/file0 supports timestamps until 2107 (0x10391447e) 07:01:16 executing program 2: r0 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x3, r0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0) 07:01:16 executing program 4: renameat(0xffffffffffffff9c, &(0x7f0000001a40)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000001bc0)='./file0\x00') 07:01:16 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000001900)='ns/time_for_children\x00') 07:01:16 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004005000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:16 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xc}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:16 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xb, r0, &(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0) 07:01:16 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xd}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:16 executing program 1: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0xfffffffffffffc7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 2161.602918][ T8304] loop5: detected capacity change from 0 to 255 [ 2161.624951][ T8304] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:16 executing program 2: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) fstat(r0, &(0x7f0000000040)) 07:01:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:16 executing program 1: ioperm(0x0, 0x20, 0xcb) ioperm(0x0, 0x6, 0x3) 07:01:16 executing program 2: futex(0x0, 0x0, 0x0, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) 07:01:16 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004006000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2161.645236][ T8304] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2549/file0 supports timestamps until 2107 (0x10391447e) 07:01:16 executing program 4: mbind(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(&(0x7f0000000000), 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4) 07:01:16 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xe}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:16 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x7ade25d78a79fe1d) 07:01:16 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04000076b65be2f6da47278c750525a5b65a09", 0x78, 0x400}, {&(0x7f0000010080)="000000000000000000000000ede2de4df49d4f87b54a3176cfd4eb4f010040000c000000000000009f09c75f", 0x2c, 0x4e0}, {&(0x7f00000100c0)="01000000000000000000000000000000000000000401000012", 0x19, 0x560}, {&(0x7f00000100e0)="00000000000000000000000000000000000000000104", 0x16, 0x640}, {&(0x7f0000010100)="000000000000000000000000000000000000000000000000000000005178aedb0300000013000000230000002b0005000200040000000000907306c205002a9c00000000000000000000000000000000000000000000000091ecd11b", 0x5c, 0x7e0}, {&(0x7f0000010ce0)="00000000000000000000000000000000000000000000000000000000c99b0000ed410000000400009f09c75f9f09c75f9f09c75f00000000000003000200000000000800000000000af3010004000000000000000000000001000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c1f", 0x9e, 0x8c60}], 0x0, &(0x7f0000010f60)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./mnt\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYRES16]) 07:01:16 executing program 1: prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000240)='F', 0x1) 07:01:16 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xf}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:16 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0x11, r0, 0x0, 0x0, 0x0) 07:01:16 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:16 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x10}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2161.771611][ T8333] loop5: detected capacity change from 0 to 255 [ 2161.800960][ T8333] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:17 executing program 4: pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, 0x0, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140), 0x8}) 07:01:17 executing program 1: clock_adjtime(0x0, &(0x7f0000000100)={0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa186010000000000}) [ 2161.847462][ T8333] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2550/file0 supports timestamps until 2107 (0x10391447e) 07:01:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004007000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:17 executing program 2: capget(&(0x7f0000002d00)={0x20080522}, &(0x7f0000002d40)) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x11}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000100)={0x101}, 0x4) 07:01:17 executing program 1: r0 = gettid() ptrace$getregset(0x8, r0, 0x0, 0x0) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:17 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000000500)=""/12, 0xc}], 0x1}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/sockstat6\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0, 0x0) 07:01:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x4899f0c5f1feceb6}, 0xc) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x12}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="0020780000010001000000024a7400a80065000008"]}) 07:01:17 executing program 2: timer_create(0x1, 0x0, &(0x7f0000000140)) timer_settime(0x0, 0x1, &(0x7f00000001c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000200)) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x18}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2162.003957][ T8381] loop5: detected capacity change from 0 to 255 07:01:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004008000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:17 executing program 4: keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000040)) keyctl$invalidate(0x15, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000080), &(0x7f00000000c0)={'enc=', 'oaep', ' hash=', {'rmd160\x00'}}, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000001180), &(0x7f00000011c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$search(0xa, r0, &(0x7f0000001200)='trusted\x00', &(0x7f0000001240)={'syz', 0x1}, 0xffffffffffffffff) keyctl$link(0x8, r0, 0x0) r1 = add_key$keyring(&(0x7f0000001340), &(0x7f0000001380)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x0) keyctl$chown(0x4, r1, 0x0, 0x0) syz_read_part_table(0x5, 0x5, &(0x7f0000002740)=[{0x0, 0x0, 0x4}, {&(0x7f00000015c0), 0x0, 0xfffffffffffffff7}, {0x0}, {&(0x7f00000026c0)="03be942a2636c58c40e5e8667d0f9ab2443ff06c0350831582219d567339684c25c0bd54adc3e7e5363cd90387b51c33333e74", 0x33}, {&(0x7f0000002700), 0x0, 0x1b4a}]) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, 0x0, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000002a40)={&(0x7f0000002900)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x5040}, 0x8010) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_open_dev$evdev(&(0x7f0000000080), 0x3, 0xa0041) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x2e, 0x2}, @cond}) write$evdev(r1, &(0x7f0000000040), 0x2a0) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x19}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000580)={'sit0\x00', &(0x7f0000000500)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, @loopback}}) [ 2162.051795][ T8381] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2162.079213][ T8381] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2551/file0 supports timestamps until 2107 (0x10391447e) 07:01:17 executing program 4: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\tr-st\xe3c*sgrVid:De', 0x0) syz_open_procfs(0x0, 0x0) 07:01:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000000)=0x9f, 0x4) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x22}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x11, 0x0, &(0x7f0000000040)) 07:01:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0x8000, 0x4) 07:01:17 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000011c0)="c6", 0x2d) [ 2162.209423][ T8433] loop5: detected capacity change from 0 to 255 [ 2162.224605][ T8433] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) epoll_create1(0x84d7f15ba7b711dc) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x25}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004009000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:17 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={[{@nr_inodes={'nr_inodes', 0x3d, [0x65, 0x0]}}]}) 07:01:17 executing program 1: syz_io_uring_setup(0x2c6c, &(0x7f0000000000), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)) syz_io_uring_setup(0x0, &(0x7f0000000100), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f00000001c0)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) [ 2162.255229][ T8433] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2552/file0 supports timestamps until 2107 (0x10391447e) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "b205a6b5cd1eea547b1cc13fb86ca251242285"}) 07:01:17 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001540), 0x301002, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_L}]}}) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x48}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000400), 0x9010, &(0x7f0000000480)) 07:01:17 executing program 2: r0 = gettid() migrate_pages(r0, 0x3, 0x0, &(0x7f00000000c0)=0x9) [ 2162.368297][ T8467] loop5: detected capacity change from 0 to 255 [ 2162.396191][ T8467] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x4c}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 4: pkey_mprotect(&(0x7f0000ff3000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) [ 2162.427005][ T8467] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2553/file0 supports timestamps until 2107 (0x10391447e) 07:01:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400a000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 07:01:17 executing program 1: r0 = fork() process_vm_writev(r0, &(0x7f0000001680)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1, &(0x7f0000002ac0)=[{0x0}, {&(0x7f0000001980)=""/4096, 0x1000}], 0x2, 0x0) 07:01:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000340)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @remote}}}, 0x108) getsockopt$inet_buf(r1, 0x0, 0x30, &(0x7f0000000340)=""/225, &(0x7f0000000140)=0xe1) 07:01:17 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12001, 0x0) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x60}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2162.530995][ T8494] loop5: detected capacity change from 0 to 255 07:01:17 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb703, 0x0) 07:01:17 executing program 2: prctl$PR_GET_TID_ADDRESS(0x19, &(0x7f0000000000)) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x68}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 1: syz_io_uring_setup(0x782a, &(0x7f0000000140)={0x0, 0x4000e021, 0x8}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000300)) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) [ 2162.583735][ T8494] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2162.607184][ T8494] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2554/file0 supports timestamps until 2107 (0x10391447e) 07:01:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x1100, 0x10, 0x0, 0x0) 07:01:17 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 07:01:17 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_OWNER_UID(r0, 0xb702, 0x0) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x6c}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400b000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) 07:01:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x21, 0x0, &(0x7f0000000040)) 07:01:17 executing program 2: r0 = gettid() waitid(0x2, r0, 0x0, 0x4, 0x0) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x74}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:17 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') 07:01:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000200)={'gre0\x00', 0x0}) 07:01:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) 07:01:17 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x78}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2162.772120][ T8538] loop5: detected capacity change from 0 to 255 07:01:17 executing program 2: sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = socket(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), 0xffffffffffffffff) sendto$unix(r0, &(0x7f00000005c0)="24d29f2041f8ba5378ecbbc7c405d00d3fc719778a684a7df63d1e407d28b7702d0194401278ec1f55fa50dd99cb9f8b1cdcd0", 0x33, 0x4000000, &(0x7f0000000640)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4048051}, 0x8810) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4048051}, 0x8810) chdir(&(0x7f0000000100)='./file0\x00') r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DURATION={0x5, 0x15, 0x8}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x80}, @IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0xb}]}, 0x34}, 0x1, 0x0, 0x0, 0x4810}, 0x40008c0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000940)={0x16, 0x17, 0x1, {0xd, './file0/file0'}}, 0x16) sendfile(r3, r3, &(0x7f0000000240), 0x7fff) 07:01:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000), 0x4) 07:01:18 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x7a}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2162.832655][ T8538] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2162.860083][ T8538] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2555/file0 supports timestamps until 2107 (0x10391447e) 07:01:18 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400c000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x34) 07:01:18 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xfe}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) 07:01:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x5413, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "b205a6b5cd1eea547b1cc13fb86ca251242285"}) 07:01:18 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() tkill(0x0, 0x34) 07:01:18 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x10e}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:18 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) 07:01:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, 0x0) [ 2163.015066][ T8591] loop5: detected capacity change from 0 to 255 [ 2163.042099][ T8591] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2163.059200][ T8591] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2556/file0 supports timestamps until 2107 (0x10391447e) 07:01:18 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x8008001) 07:01:18 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x204}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:18 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='syz_tun\x00', 0x10) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) 07:01:18 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400d000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:18 executing program 2: syz_mount_image$msdos(0x0, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) chdir(&(0x7f0000000000)='./file1\x00') 07:01:18 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x282}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2163.747164][ T8617] loop5: detected capacity change from 0 to 255 [ 2163.762858][ T8617] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:18 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x300}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:18 executing program 4: pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f00000000c0), 0x0, 0x0) [ 2163.784644][ T8617] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2557/file0 supports timestamps until 2107 (0x10391447e) 07:01:21 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() tkill(0x0, 0x34) 07:01:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5452, &(0x7f0000000000)={0x2, {0x3}}) 07:01:21 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400e000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6b2, 0x0, &(0x7f0000000040)) 07:01:21 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x38a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:21 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/pm_debug_messages', 0x40643, 0x0) 07:01:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, &(0x7f0000002300), 0x0, &(0x7f0000002380)={[{@shortname_winnt}, {@shortname_lower}]}) 07:01:21 executing program 2: pkey_mprotect(&(0x7f0000ff5000/0xb000)=nil, 0xb000, 0x400000c, 0xffffffffffffffff) 07:01:21 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x39b}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:21 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000011c0)="c6", 0x2d) [ 2166.051466][ T8646] loop5: detected capacity change from 0 to 255 07:01:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x24, r2, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}]}, 0x24}}, 0x0) 07:01:21 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/sg', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x40010, r0, 0x8000000) [ 2166.093192][ T8646] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2166.116907][ T8646] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2558/file0 supports timestamps until 2107 (0x10391447e) 07:01:24 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() tkill(0x0, 0x34) 07:01:24 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x39c}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:24 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000180)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0xd}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) 07:01:24 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400f000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:24 executing program 1: clock_gettime(0x7, &(0x7f0000000200)) 07:01:24 executing program 2: sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000003100), 0xffffffffffffffff) 07:01:24 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop0', 0x600580, 0x0) 07:01:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 07:01:24 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x39d}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2169.079530][ T8685] loop5: detected capacity change from 0 to 255 [ 2169.102067][ T8685] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:24 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000015c0), 0x4000, 0x0) 07:01:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000200)=0x7, 0x4) 07:01:24 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x39e}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2169.138728][ T8685] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2559/file0 supports timestamps until 2107 (0x10391447e) 07:01:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000c80)={&(0x7f0000000a40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000c40)=[{0x0}, {&(0x7f0000000ac0)="ba", 0x1}, {&(0x7f0000000b80)="e0", 0x1}], 0x3}, 0x0) 07:01:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @rand_addr=0x64010101, 0x4}, @qipcrtr={0x2a, 0x3, 0x3fff}, @l2={0x1f, 0x9, @none, 0x8, 0x2}, 0x7ff, 0x0, 0x0, 0x0, 0x81, &(0x7f0000000000)='wlan1\x00', 0x0, 0x2}) 07:01:27 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x0) 07:01:27 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004010000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:27 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x39f}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x80, 0x4) 07:01:27 executing program 4: set_mempolicy(0x8000, &(0x7f0000000000), 0x5) 07:01:27 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3a0}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:27 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @multicast2}, @phonet, @nl}) 07:01:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, 0x0, 0x0) 07:01:27 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3a1}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2172.142982][ T8727] loop5: detected capacity change from 0 to 255 [ 2172.180887][ T8727] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000015c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x1, &(0x7f0000001480)=[{}], 0x0}, &(0x7f0000001640)=0x50) 07:01:27 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3a2}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x9, 0x4) [ 2172.213715][ T8727] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2560/file0 supports timestamps until 2107 (0x10391447e) 07:01:30 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x0) 07:01:30 executing program 2: mlock(&(0x7f0000a9a000/0x4000)=nil, 0x4000) mremap(&(0x7f0000a99000/0x4000)=nil, 0x4000, 0x4000, 0x7, &(0x7f00008d7000/0x4000)=nil) 07:01:30 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x6, 0x12, 0x0, &(0x7f0000000080)) 07:01:30 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004011000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:30 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3a3}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:30 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000004, 0x11, r0, 0x8000000) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mlock(&(0x7f0000feb000/0x14000)=nil, 0x14000) 07:01:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000006c0)={0x18, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_IE_PROBE_RESP={0x4, 0x11a}]}, 0x18}}, 0x0) 07:01:30 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000004, 0x11, r0, 0x8000000) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 07:01:30 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3a4}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:30 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x40000}, 0x0) [ 2175.196182][ T8767] loop5: detected capacity change from 0 to 255 [ 2175.221502][ T8767] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x89a3, &(0x7f0000000640)={'batadv_slave_0\x00'}) 07:01:30 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3a5}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2175.257712][ T8767] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2561/file0 supports timestamps until 2107 (0x10391447e) [ 2175.261370][ T8777] netlink: 'syz-executor.1': attribute type 282 has an invalid length. [ 2175.293108][ T8781] netlink: 'syz-executor.1': attribute type 282 has an invalid length. 07:01:33 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) sendmsg$ETHTOOL_MSG_FEATURES_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRES16=0x0, @ANYBLOB="44c353602c22c92dbb0c0c"], 0xe8}}, 0x0) clone(0x82100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000380)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102385, 0xfff7}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x0) 07:01:33 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000440)='/sys/block/loop0', 0x2, 0x0) write$evdev(r0, 0x0, 0x0) 07:01:33 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "4a376e8a1de62690dc35dd76ae315a695598ab1ba1e683abab1ae4aaa94fefcc33f18344f0b4853f7606a2c976a613626f93b649c4b4eb74705097eb5b38b69b"}, 0x48, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc3}, &(0x7f0000000180)={0x0, "4a376e8a1de62690dc35dd76ae315a695598ab1ba1e683abab1ae4aaa94fefcc33f18344f0b4853f7606a2c976a613626f93b649c4b4eb74705097eb5b38b69b"}, 0x48, 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) 07:01:33 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3a6}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:33 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004012000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:33 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) 07:01:33 executing program 1: mremap(&(0x7f0000e3d000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000468000/0x2000)=nil) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000e40000/0x4000)=nil, 0x4000}, &(0x7f0000000040)=0x10) [ 2178.243417][ T8798] loop5: detected capacity change from 0 to 255 [ 2178.265533][ T8798] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:33 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f00000001c0)) 07:01:33 executing program 4: sendmsg$NFNL_MSG_ACCT_GET(0xffffffffffffffff, 0x0, 0x4040845) syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff7e23a065916bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) r0 = socket(0x0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140), r1) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), 0xffffffffffffffff) sendto$unix(r0, &(0x7f00000005c0)="24d29f2041f8ba5378ecbbc7c405d00d3fc719778a684a7df63d1e407d28b7702d0194401278ec1f55fa50dd99cb9f8b1cdcd05aad30", 0x36, 0x4000000, &(0x7f0000000640)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4048051}, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_SCAN_REQ(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, r3, 0x200, 0x70bd26, 0x25dfdbfe, {}, [@IEEE802154_ATTR_DURATION={0x5, 0x15, 0x8}, @IEEE802154_ATTR_DURATION={0x5, 0x15, 0x80}, @IEEE802154_ATTR_SCAN_TYPE={0x5}, @IEEE802154_ATTR_CHANNELS={0x8, 0x14, 0xb}]}, 0x34}, 0x1, 0x0, 0x0, 0x4810}, 0x40008c0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000940)={0x16, 0x17, 0x1, {0xd, './file0/file0'}}, 0x16) sendfile(r4, r4, &(0x7f0000000240), 0x7fff) 07:01:33 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x402}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:33 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004018000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:33 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x406}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2178.302393][ T8798] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2562/file0 supports timestamps until 2107 (0x10391447e) [ 2178.403300][ T8830] loop5: detected capacity change from 0 to 255 [ 2178.413558][ T8830] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2178.423107][ T8830] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2563/file0 supports timestamps until 2107 (0x10391447e) 07:01:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='4\x00\x00\x00P\x00o'], 0x34}}, 0x0) 07:01:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='lp\x00', 0x3) 07:01:36 executing program 1: syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000800), r0) 07:01:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x500}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:36 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004019000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:36 executing program 0: r0 = getpid() tgkill(r0, r0, 0x41) 07:01:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x600}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, 0x0) 07:01:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCGSTAMP(r0, 0x5460, 0x0) 07:01:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0xc020660b, 0x0) [ 2181.304000][ T8849] loop5: detected capacity change from 0 to 255 [ 2181.327926][ T8849] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x24, 0x2, 0x3, 0x801, 0x0, 0x0, {}, [@NFQA_CFG_FLAGS={0x8}, @NFQA_CFG_MASK={0x8}]}, 0x24}}, 0x0) 07:01:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000000)={'vlan1\x00', @ifru_hwaddr=@local}) 07:01:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x604}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 07:01:36 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, 0x6, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 2181.360563][ T8849] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2564/file0 supports timestamps until 2107 (0x10391447e) 07:01:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x8983, 0x0) 07:01:36 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004022000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f0000000140)) 07:01:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x18, 0x4) 07:01:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x700}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @ipv4={'\x00', '\xff\xff', @private}}}) 07:01:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) 07:01:36 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, 0x6, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x28}}, 0x0) 07:01:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'tunl0\x00', &(0x7f0000000000)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @multicast1}}}}) 07:01:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x900}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:36 executing program 1: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000400)) 07:01:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6tnl0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @ipv4={'\x00', '\xff\xff', @private}}}) [ 2181.508374][ T8897] loop5: detected capacity change from 0 to 255 [ 2181.532298][ T8897] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:36 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) recvmsg$unix(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) [ 2181.559664][ T8897] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2565/file0 supports timestamps until 2107 (0x10391447e) 07:01:36 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004025000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x890b, 0x0) 07:01:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) 07:01:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 07:01:36 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}) 07:01:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa0b}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCGSTAMP(r0, 0x80108906, 0x0) 07:01:36 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f00000017c0)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@NLBL_UNLABEL_A_SECCTX={0x28, 0x7, 'system_u:object_r:mqueue_spool_t:s0\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2400c055}, 0x40000) 07:01:36 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x2, &(0x7f0000000a80)) 07:01:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa0c}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000080)=0x24) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, 0x0) [ 2181.703633][ T8949] loop5: detected capacity change from 0 to 255 [ 2181.729424][ T8949] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) 07:01:36 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_SYS_OFFSET(r0, 0x43403d05, &(0x7f0000000140)) 07:01:36 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa0d}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:36 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004048000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2181.749570][ T8949] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2566/file0 supports timestamps until 2107 (0x10391447e) [ 2181.826976][ T8974] loop5: detected capacity change from 0 to 255 [ 2181.835238][ T8974] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2181.844857][ T8974] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2567/file0 supports timestamps until 2107 (0x10391447e) 07:01:37 executing program 4: socket(0x26, 0x5, 0x80000001) 07:01:37 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000009c0), 0x8, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) 07:01:37 executing program 2: socket$netlink(0x10, 0x3, 0x2f416bf55dd30ad8) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa0e}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:37 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000780)='ns/uts\x00') 07:01:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000404c000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa0f}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000000240)=[{{&(0x7f0000000440)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c, 0x0}}], 0x1, 0x2400c0d1) 07:01:37 executing program 0: syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00') 07:01:37 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x8bb06210c77d4c88, 0x0) [ 2182.544688][ T8988] loop5: detected capacity change from 0 to 255 [ 2182.580465][ T8988] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa10}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000048c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000040)='p', 0x1}], 0x1}}, {{&(0x7f00000013c0)={0xa, 0x4e21, 0x0, @local, 0x1f}, 0x1c, &(0x7f0000002880)=[{&(0x7f0000001400)="590ce029e0c04ff1f5876978232c17a4226083e4d796d1f19ed696d09154e42c005d75cbf151860f0c6fa345ebbc8978662cf053e0934c38c20bbcf8cfe67204cfbbdf680ce71dbff04f965f46459c067ad6009b2024c6f73de8a3456a067ab427bbc75440daf33ddf3fd8ee3694dc0b736dd62f2b13e7c26b6f15c583d6c02f9c99ed72c9be6a", 0x87}, {&(0x7f00000014c0)="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", 0xdfe}], 0x2, &(0x7f0000002900)=[@dstopts_2292={{0xe0, 0x29, 0x4, {0x0, 0x19, '\x00', [@enc_lim, @hao={0xc9, 0x10, @local}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}, @pad1, @generic={0x0, 0x8a, "91e1da8047c585f5e8ca3ca9b7c58c387aa1f8019fe898b725b6e318147f2d941f7df863fbabb5943be5aabdb9e99c0c0770618c5306d262b494e9da917cbb8069e3ead41cc29f6f229fbc8ae47d319263f7dd48e8dfe2e04a29054d8f78e7a7f1da0b42a59ffdafce1737f9ff1f00ef9fcf9218b919a9192ca6f9cf3f4d04d7fbb939d6ce46d6aab6a3"}, @jumbo, @padn={0x1, 0x2, [0x0, 0x0]}]}}}], 0xe0}}], 0x2, 0x0) 07:01:37 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PEROUT_REQUEST(r0, 0x40383d03, &(0x7f0000000000)) 07:01:37 executing program 2: add_key$user(&(0x7f00000000c0), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 07:01:37 executing program 0: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST(r0, 0x40103d02, &(0x7f0000000000)) [ 2182.610634][ T8988] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2568/file0 supports timestamps until 2107 (0x10391447e) 07:01:37 executing program 4: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f0000000140)={&(0x7f0000000100)={[0x276]}, 0x8}) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa11}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004060000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:37 executing program 2: r0 = fork() tkill(r0, 0xb) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) 07:01:37 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000009c0), 0x8, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 07:01:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa12}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:37 executing program 1: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 07:01:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) poll(&(0x7f0000000080)=[{r0, 0x200}], 0x1, 0x7ff) 07:01:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000004c0), 0x4) 07:01:37 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') 07:01:37 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x0) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa13}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:37 executing program 2: getitimer(0x1, &(0x7f0000000140)) [ 2182.765326][ T9047] loop5: detected capacity change from 0 to 255 [ 2182.804166][ T9047] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004068000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000009c0), 0x8, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) 07:01:37 executing program 1: r0 = socket(0x2, 0x3, 0x5) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 07:01:37 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 07:01:37 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x201}, 0x14}}, 0x0) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa14}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2182.836028][ T9047] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2569/file0 supports timestamps until 2107 (0x10391447e) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa15}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:37 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') r0 = eventfd(0x6) read$eventfd(r0, &(0x7f0000000140), 0x8) 07:01:37 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa16}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x2) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000004740)=0x19, 0x4) [ 2182.912770][ T9071] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=9071 comm=syz-executor.2 [ 2182.951734][ T9084] loop5: detected capacity change from 0 to 255 07:01:37 executing program 0: setitimer(0x0, 0x0, &(0x7f0000002200)) 07:01:37 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000406c000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:37 executing program 4: signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x40800) 07:01:37 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa17}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r0, &(0x7f0000000000)=@rc={0x1f, @none}, 0xfed7) 07:01:37 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x84840) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 07:01:37 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f00000009c0), 0x8, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') [ 2182.961817][ T9084] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2182.983110][ T9084] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2570/file0 supports timestamps until 2107 (0x10391447e) 07:01:38 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r0, 0x0, &(0x7f00000003c0)) 07:01:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x6, 0x4) 07:01:38 executing program 4: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x65073e5325599b86, 0x0) 07:01:38 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa18}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)) 07:01:38 executing program 0: memfd_create(&(0x7f0000000300)='/dev/bsg\x00', 0x3) [ 2183.091013][ T9112] loop5: detected capacity change from 0 to 255 [ 2183.127280][ T9112] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:38 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004074000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:38 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa19}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:38 executing program 0: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='illinois\x00', 0x9) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 07:01:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd4(0xffffffffffffffff, &(0x7f00000009c0), 0x8, 0x0) splice(r0, 0x0, r1, 0x0, 0x8, 0x0) 07:01:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=0xffffffffffffffff) 07:01:38 executing program 2: r0 = open(&(0x7f0000000200)='./file0\x00', 0x4004040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x2, r1}) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 07:01:38 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa1a}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2183.147272][ T9112] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2571/file0 supports timestamps until 2107 (0x10391447e) 07:01:38 executing program 0: socket(0x0, 0x80b, 0x0) 07:01:38 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000068c0)=[{{&(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000002640)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}, @dontfrag={{0x14}}], 0x30}}], 0x1, 0x0) 07:01:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x30, 0x0, &(0x7f0000000100)) 07:01:38 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xb00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:38 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 07:01:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={@loopback}) 07:01:38 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x4d, 0x0, 0x11}, {}]}) 07:01:38 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xb0a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:38 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004078000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:38 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/meminfo\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) [ 2183.257219][ T9151] loop5: detected capacity change from 0 to 255 [ 2183.278970][ T9151] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2183.292462][ T9151] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2572/file0 supports timestamps until 2107 (0x10391447e) [ 2183.373031][ T9175] loop5: detected capacity change from 0 to 255 [ 2183.381572][ T9175] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2183.391465][ T9175] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2573/file0 supports timestamps until 2107 (0x10391447e) 07:01:39 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/zoneinfo\x00', 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 07:01:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xc00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:39 executing program 4: r0 = socket(0x2, 0x3, 0x5) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@local, @dev, @mcast1}) 07:01:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20808, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 07:01:39 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003980)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000c00)=[@pktinfo={{0x24, 0x29, 0x32, {@dev}}}], 0x28}}], 0x2, 0x0) 07:01:39 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000407a000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xc) 07:01:39 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000002b80)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @remote, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000001340)=[@tclass={{0x14}}], 0x18}}], 0x1, 0x0) 07:01:39 executing program 4: r0 = socket(0x2, 0x3, 0x5) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) 07:01:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xc0a}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2184.123169][ T9191] loop5: detected capacity change from 0 to 255 07:01:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003980)=[{{&(0x7f0000000100)={0xa, 0x4e23, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) 07:01:39 executing program 0: r0 = socket(0x26, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 07:01:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0xfffffffc, 0x5, 0x0, 0x0, 0xffffffffffffffff}) 07:01:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000000700)) 07:01:39 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000000)) [ 2184.166066][ T9191] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2184.194930][ T9191] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2574/file0 supports timestamps until 2107 (0x10391447e) 07:01:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0xfffffffa, 0x4) 07:01:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xd00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000300), 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000340)) 07:01:39 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040fb000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:39 executing program 4: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x8900) 07:01:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000180), 0x4) 07:01:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'syztnl2\x00', 0x0}) 07:01:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xd0a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000380)) 07:01:39 executing program 1: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 07:01:39 executing program 4: r0 = epoll_create(0x9) fgetxattr(r0, &(0x7f00000000c0)=@random={'os2.', 'security.capability\x00'}, 0x0, 0x0) 07:01:39 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/locks\x00', 0x0, 0x0) select(0x18, &(0x7f0000000100), &(0x7f0000000040)={0x10000000000000d}, 0x0, 0x0) 07:01:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xe00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:39 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000002d40)={0x0, 0x0, &(0x7f0000002d00)={&(0x7f0000002ec0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_CSA_IES={0x4}]}, 0x2c}}, 0x0) 07:01:39 executing program 2: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, r0+10000000}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) [ 2184.387142][ T9248] loop5: detected capacity change from 0 to 255 07:01:39 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040fe000000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xe01}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:39 executing program 4: r0 = socket(0x2, 0x3, 0x5) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 07:01:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) r1 = openat$bsg(0xffffffffffffff9c, 0x0, 0x20c001, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r1, 0xc0403d08, 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000000c0)) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000200), 0x2, 0x80d00) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000740), 0x20c001, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r3, 0xc0403d08, 0x0) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000280)={0x0, {}, 0x0, {}, 0x1ff, 0x4, 0x18, 0x22, "d8689a3d5787e302b59ff375b4545bdaff2cfaa98cf76825e8b80dc862cca6b4686e45be09d48e2ae626ae28702ce866e884118cbb3b6a805c022bc9728c7047", "201dc6d1d5e9cad12efca5a6110e1d7854b40e765b892edcc9f641c0506a5414", [0x8, 0xcc1]}) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000001c0)=0x1, 0x4) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x5) ioctl$PTP_SYS_OFFSET_PRECISE(0xffffffffffffffff, 0xc0403d08, 0x0) 07:01:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000480)=""/248, &(0x7f0000000580)=0xf8) 07:01:39 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xe0a}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2184.430014][ T9248] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2184.441121][ T9248] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2575/file0 supports timestamps until 2107 (0x10391447e) [ 2184.536936][ T9276] loop5: detected capacity change from 0 to 255 [ 2184.545304][ T9276] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2184.554831][ T9276] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2576/file0 supports timestamps until 2107 (0x10391447e) 07:01:40 executing program 1: pselect6(0x40, &(0x7f0000000140), &(0x7f0000000180), 0x0, &(0x7f0000000240), 0x0) 07:01:40 executing program 4: io_setup(0x7, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) 07:01:40 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xf00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:40 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:01:40 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400e010000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:40 executing program 2: socketpair(0x22, 0x0, 0x534, &(0x7f0000000840)) 07:01:40 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xf0a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:40 executing program 1: socketpair(0x2, 0x3, 0x0, &(0x7f0000000340)) 07:01:40 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x100a}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2185.261565][ T9292] loop5: detected capacity change from 0 to 255 [ 2185.280886][ T9292] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:40 executing program 2: pipe(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_devices(r0, 0x0, 0x0) 07:01:40 executing program 4: socket(0x2e, 0x0, 0x0) 07:01:40 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1020}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:40 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000409e010000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:40 executing program 2: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, r0+10000000}, 0x0) [ 2185.308081][ T9292] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2577/file0 supports timestamps until 2107 (0x10391447e) 07:01:40 executing program 4: clock_gettime(0x0, &(0x7f0000000200)={0x0}) pselect6(0x0, 0x0, &(0x7f0000000180)={0x100000000, 0x0, 0x9, 0x5, 0x6}, &(0x7f00000001c0)={0x180000000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000000240)={r0}, &(0x7f00000002c0)={&(0x7f0000000280)={[0x5]}, 0x8}) [ 2185.407341][ T9325] loop5: detected capacity change from 0 to 255 [ 2185.415700][ T9325] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2185.425335][ T9325] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2578/file0 supports timestamps until 2107 (0x10391447e) 07:01:41 executing program 1: socketpair(0x2, 0xa, 0x0, &(0x7f0000000280)) 07:01:41 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) 07:01:41 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1100}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x0) 07:01:41 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004004020000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:41 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x110a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x34, r1, 0x1, 0x0, 0x0, {{}, {}, {0x3, 0x17, {0x0, 0x0, @udp='udp:syz0\x00'}}}}, 0x34}}, 0x0) [ 2186.133501][ T9341] loop5: detected capacity change from 0 to 255 [ 2186.151063][ T9341] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x1, 0x6}, 0x10) 07:01:41 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1200}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:41 executing program 0: r0 = socket(0x11, 0xa, 0x0) sendmsg$NL80211_CMD_SET_PMK(r0, &(0x7f0000002080)={&(0x7f0000001f80), 0xc, &(0x7f0000002040)={0x0}}, 0x0) 07:01:41 executing program 1: clock_gettime(0x0, &(0x7f0000000200)={0x0}) pselect6(0x40, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000240)={r0}, 0x0) [ 2186.180067][ T9341] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2579/file0 supports timestamps until 2107 (0x10391447e) 07:01:41 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_MODE(r0, &(0x7f0000000280)={&(0x7f0000000140), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 07:01:41 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004061020000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:41 executing program 2: r0 = socket(0xa, 0x5, 0x0) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x20, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 07:01:41 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x120a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:41 executing program 0: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00'}) 07:01:41 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_LBT_MODE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}}, 0x0) 07:01:41 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x130a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:41 executing program 0: socketpair(0xa, 0x3, 0x9, &(0x7f0000000440)) 07:01:41 executing program 4: syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), 0xffffffffffffffff) [ 2186.310718][ T9380] loop5: detected capacity change from 0 to 255 [ 2186.334186][ T9380] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:41 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x140a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:41 executing program 0: socketpair(0x2c, 0x0, 0x0, &(0x7f00000004c0)) [ 2186.373456][ T9380] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2580/file0 supports timestamps until 2107 (0x10391447e) 07:01:42 executing program 1: socketpair(0x2, 0x0, 0x0, &(0x7f00000054c0)) 07:01:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) 07:01:42 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000180), r0) 07:01:42 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:42 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x150a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:42 executing program 0: pselect6(0x40, &(0x7f0000000140)={0x4}, 0x0, 0x0, &(0x7f0000000240), 0x0) 07:01:42 executing program 4: socketpair(0x1e, 0x0, 0x8, &(0x7f00000000c0)) 07:01:42 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x160a}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2187.139436][ T9425] loop5: detected capacity change from 0 to 255 [ 2187.165767][ T9425] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:42 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000400)={&(0x7f0000000000)=@abs={0x1}, 0x6e, 0x0}, 0x0) 07:01:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x76bbc095d82ff5dd}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) 07:01:42 executing program 0: pselect6(0x40, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) 07:01:42 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x170a}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2187.199930][ T9425] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2581/file0 supports timestamps until 2107 (0x10391447e) 07:01:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000180)=0xfffffffd, 0x4) 07:01:42 executing program 2: socketpair(0x28, 0x0, 0x0, &(0x7f0000003e00)) 07:01:42 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000408a030000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:42 executing program 1: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000240)={0x0, r0+10000000}, 0x0) 07:01:42 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1800}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:42 executing program 2: pipe(&(0x7f0000004100)={0xffffffffffffffff}) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) 07:01:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) [ 2187.291395][ T9455] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=9455 comm=syz-executor.4 07:01:42 executing program 2: socketpair(0x2, 0x3, 0xa1, &(0x7f0000000340)) 07:01:42 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') shmget$private(0x0, 0x3000, 0x80, &(0x7f00008c1000/0x3000)=nil) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) shmctl$IPC_STAT(0x0, 0x2, 0x0) 07:01:42 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x180a}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2187.369122][ T9469] loop5: detected capacity change from 0 to 255 [ 2187.389079][ T9469] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2187.408960][ T9469] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2582/file0 supports timestamps until 2107 (0x10391447e) 07:01:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_mr_cache\x00') r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xa, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pread64(r0, &(0x7f0000000140)=""/150, 0x96, 0x2) 07:01:43 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) shutdown(r0, 0x0) sendto$inet6(r0, &(0x7f0000000380)="bc", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) close(r0) 07:01:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1900}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:43 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000408b030000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:43 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') shmget$private(0x0, 0x3000, 0x80, &(0x7f00008c1000/0x3000)=nil) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) shmctl$IPC_STAT(0x0, 0x2, 0x0) 07:01:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_mr_cache\x00') pread64(r0, &(0x7f00000001c0)=""/154, 0x9a, 0x4) 07:01:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x190a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:43 executing program 1: signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0x8]}, 0x8) r0 = add_key$user(&(0x7f0000000200), &(0x7f0000000440), &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) add_key$user(0x0, 0x0, &(0x7f0000000300)="96", 0x1, 0x0) r1 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r0, r1}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'vmac64(aes)\x00'}}) [ 2188.206943][ T9504] loop5: detected capacity change from 0 to 255 07:01:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) 07:01:43 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') shmget$private(0x0, 0x3000, 0x80, &(0x7f00008c1000/0x3000)=nil) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) shmctl$IPC_STAT(0x0, 0x2, 0x0) [ 2188.251328][ T9504] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:43 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) sendto$inet6(r0, &(0x7f0000002b00)='r', 0x1, 0x400400c, 0x0, 0x0) 07:01:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1a0a}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x2000004e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2000000012, &(0x7f0000000000)=0x7ffffffffe, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000340)='hybla\x00', 0x6) sendto$inet(r0, 0x0, 0x0, 0x1000000024004044, &(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0xfffffd46, 0x81f4, 0x0, 0x1f4) [ 2188.292995][ T9504] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2583/file0 supports timestamps until 2107 (0x10391447e) 07:01:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETFLOWTABLE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, 0x17, 0xa, 0x301}, 0x14}}, 0x0) 07:01:43 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000409e030000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1f00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x60, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0xe, 0x3, 'bitmap:ip\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0xad}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8}}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x60}}, 0x0) 07:01:43 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000002240)={0x0, 0x0}) 07:01:43 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') shmget$private(0x0, 0x3000, 0x80, &(0x7f00008c1000/0x3000)=nil) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) shmctl$IPC_STAT(0x0, 0x2, 0x0) 07:01:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2000}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2188.417266][ T9545] loop5: detected capacity change from 0 to 255 [ 2188.449457][ T9545] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:43 executing program 2: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), 0x0) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') shmget$private(0x0, 0x3000, 0x80, &(0x7f00008c1000/0x3000)=nil) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) shmctl$IPC_STAT(0x0, 0x2, 0x0) 07:01:43 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') shmget$private(0x0, 0x3000, 0x80, &(0x7f00008c1000/0x3000)=nil) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:43 executing program 0: futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xfffffffd) 07:01:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2010}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2188.489378][ T9545] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2584/file0 supports timestamps until 2107 (0x10391447e) 07:01:43 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004002040000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2200}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:43 executing program 2: socket(0x0, 0x87432b5270f93254, 0x0) [ 2188.557409][ T9574] futex_wake_op: syz-executor.0 tries to shift op by -1; fix this program [ 2188.584573][ T9574] futex_wake_op: syz-executor.0 tries to shift op by -1; fix this program 07:01:43 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x13, 0xa, 0x126}}) 07:01:43 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2500}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2188.643254][ T9594] loop5: detected capacity change from 0 to 255 [ 2188.678477][ T9600] rtc_cmos 00:00: Alarms can be up to one day in the future [ 2188.679720][ T9594] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2188.701904][ T9594] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2585/file0 supports timestamps until 2107 (0x10391447e) 07:01:44 executing program 1: capset(&(0x7f0000000080)={0x19980330}, &(0x7f00000000c0)) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x0, 0x0, 0x4f3}) 07:01:44 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x6000, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x10, 0x701, 0x0, 0x0, {0xa}, [@typed={0x6, 0x1, 0x0, 0x0, @str='\"\x00'}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r1) 07:01:44 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x2c, 0xb, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x4, 0x7, 0x0, 0x0}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x2c}}, 0x0) 07:01:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2785}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:44 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004006040000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:44 executing program 0: semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000000)=[0x0]) 07:01:44 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) getdents(r0, 0x0, 0x0) 07:01:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x279a}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2189.372513][ T9613] loop5: detected capacity change from 0 to 255 [ 2189.391173][ T9613] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:44 executing program 0: shmget(0x3, 0xf000, 0x0, &(0x7f0000ff1000/0xf000)=nil) 07:01:44 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000050000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000080)) 07:01:44 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") exit_group(0x0) readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) [ 2189.433142][ T9613] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2586/file0 supports timestamps until 2107 (0x10391447e) 07:01:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3f00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x20, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0xffffffff}) 07:01:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000140)="1a", 0x1) dup2(r1, r0) recvfrom$unix(r0, &(0x7f0000001200)=""/77, 0x4d, 0x842, 0x0, 0x0) 07:01:44 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") exit_group(0x0) readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x4000}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2189.547862][ T9646] loop5: detected capacity change from 0 to 255 [ 2189.586881][ T9646] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x490a81) 07:01:44 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x14b1c1, 0x0) write$nbd(r0, 0x0, 0x0) 07:01:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_pts(r1, 0x0) close(r2) [ 2189.601511][ T9646] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2587/file0 supports timestamps until 2107 (0x10391447e) 07:01:44 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") exit_group(0x0) readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:44 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000060000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x16943) 07:01:44 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000080)='.log\x00', 0x40840, 0x0) read$char_usb(r0, 0x0, 0x17) 07:01:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x4800}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x3e1004) 07:01:44 executing program 1: pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) write$cgroup_int(r0, 0x0, 0xfffffffffffffdfb) 07:01:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x4c00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:44 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x14b1c1, 0x0) write$P9_RSYMLINK(r0, 0x0, 0x0) 07:01:44 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) [ 2189.744184][ T9678] loop5: detected capacity change from 0 to 255 [ 2189.784068][ T9678] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x141042) 07:01:44 executing program 2: r0 = eventfd(0x9) read$eventfd(r0, &(0x7f0000000000), 0x8) 07:01:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_open_pts(r0, 0x20000) [ 2189.808857][ T9678] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2588/file0 supports timestamps until 2107 (0x10391447e) 07:01:44 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004004060000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x6000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:44 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:44 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x14b1c1, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x11) 07:01:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f134b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfed4, 0x20c49a, 0x0, 0x27) 07:01:44 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000c00)={0xa, 0x0, 0x0, @private2}, 0x1c) 07:01:44 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000180), &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="9872e6335cb9ab17e76107a950c7f221592b00040f9751a707a707ec8657826f985a9f3240cb39b4623cfaf19652705c0beba7503564881eb6b943c1efd443cf187564") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:44 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, 0x0, 0x0, 0x0) 07:01:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x6800}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:44 executing program 1: io_setup(0x7fff, &(0x7f0000000000)=0x0) io_cancel(0x0, 0x0, 0x0) io_destroy(r0) semctl$IPC_RMID(0x0, 0x0, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 07:01:44 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) [ 2189.984409][ T9726] loop5: detected capacity change from 0 to 255 07:01:44 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x6c00}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2190.029789][ T9726] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2190.049518][ T25] audit: type=1326 audit(3628306904.950:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 07:01:45 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000070000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:45 executing program 2: prctl$PR_GET_FP_MODE(0x2e) syz_read_part_table(0x7, 0x2, &(0x7f0000000000)=[{&(0x7f00000000c0)="20d9974ad309d7f69b1b7c60c25cf4e5d5b9a15287cc06f3fdfe7d80e510f92baa75a7ec91b23999316bea638de049a4d3da38a24c440e69ce902498e88fc52d53b43598cc8606ad", 0x48, 0x4}, {0x0}]) socket(0x0, 0x2, 0x8) [ 2190.076722][ T9726] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2589/file0 supports timestamps until 2107 (0x10391447e) [ 2190.102867][ T25] audit: type=1326 audit(3628306904.960:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=22 compat=0 ip=0x4665e9 code=0x7ffc0000 07:01:45 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x7400}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:45 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) [ 2190.127735][ T25] audit: type=1326 audit(3628306904.960:358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2190.159950][ T25] audit: type=1326 audit(3628306904.960:359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=278 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2190.184551][ T25] audit: type=1326 audit(3628306904.960:360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2190.222718][ T9760] loop5: detected capacity change from 0 to 255 [ 2190.241625][ T9760] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2190.251573][ T9760] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2590/file0 supports timestamps until 2107 (0x10391447e) [ 2190.251819][ T25] audit: type=1326 audit(3628306904.960:361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=157 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2190.289921][ T25] audit: type=1326 audit(3628306904.969:362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2190.313941][ T25] audit: type=1326 audit(3628306904.969:363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=22 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2190.337769][ T25] audit: type=1326 audit(3628306904.969:364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 [ 2190.361692][ T25] audit: type=1326 audit(3628306904.969:365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=9728 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x7ffc0000 07:01:45 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 07:01:45 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x7800}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:45 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:45 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000000)={0x0, 0x3}) 07:01:45 executing program 1: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/block/loop0', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/114, 0x72}], 0x1, 0x0, 0x0) 07:01:45 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000090000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:45 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:01:45 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)=ANY=[], 0xffffffe3) unlink(&(0x7f0000000000)='./bus\x00') 07:01:45 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x7a00}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:45 executing program 1: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000300)="d3", 0x1, 0x1000}], 0x0, 0x0) 07:01:45 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) [ 2190.909704][ T9780] loop5: detected capacity change from 0 to 255 [ 2190.946010][ T9780] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:45 executing program 2: shmget(0x2, 0x1000, 0x60c, &(0x7f0000ffc000/0x1000)=nil) 07:01:45 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x3938700}}, &(0x7f0000000140)) 07:01:45 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x8202}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:45 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) [ 2190.995939][ T9780] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2591/file0 supports timestamps until 2107 (0x10391447e) 07:01:45 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)={0x0}) r3 = openat(0xffffffffffffffff, &(0x7f0000000780)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000001c0)={r2}) 07:01:45 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040000a0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x8527}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1000000000000017, 0xd9f, 0x0) clone(0x5fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x40000000, 0x0) r1 = gettid() fork() wait4(0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r1) tkill(r1, 0x800000009) [ 2191.166377][ T9816] loop5: detected capacity change from 0 to 255 [ 2191.177540][ T9816] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2191.186998][ T9816] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2592/file0 supports timestamps until 2107 (0x10391447e) 07:01:46 executing program 0: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)='\x00', 0x0) request_key(&(0x7f0000000440)='user\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0) 07:01:46 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x8a03}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040000b0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:46 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x87}, {0x6}]}) 07:01:46 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_print_times', 0x12841, 0x0) 07:01:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000001940)={0x0, 0x0, 0x0}, 0x1) 07:01:46 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:46 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x0) 07:01:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9a27}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2191.397531][ T9838] loop5: detected capacity change from 0 to 255 [ 2191.415199][ T9838] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:46 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:46 executing program 2: prctl$PR_GET_TID_ADDRESS(0x1c, &(0x7f0000000000)) [ 2191.442650][ T9838] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2593/file0 supports timestamps until 2107 (0x10391447e) 07:01:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9b03}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:46 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) recvmsg$unix(r0, &(0x7f000000b300)={0x0, 0x0, 0x0, 0x0, &(0x7f000000b280)}, 0x102) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001780)={0x0, 0x0, &(0x7f0000001740)={&(0x7f00000002c0)={0x4c, 0x12, 0x1}, 0x4c}}, 0x0) 07:01:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040000c0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:46 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000000)={0xf7ffffc4, 0x0, 0x0, 0x0, 0x0, "b05ed32976190200"}) write(r0, &(0x7f00000000c0)="b4", 0xfdef) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x5412, &(0x7f00000000c0)=0x13) 07:01:46 executing program 2: r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000380)={[{@utf8}]}) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) 07:01:46 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000080)=[{r0, 0x4}], 0x1, 0xffffffff) 07:01:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9c03}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:46 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_int(r0, 0xffff, 0x800, 0x0, 0x0) 07:01:46 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) 07:01:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040000d0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) [ 2191.618551][ T9881] loop5: detected capacity change from 0 to 255 [ 2191.637517][ T9881] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 07:01:46 executing program 1: munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) 07:01:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9d03}], 0x0, &(0x7f00000004c0)=ANY=[]) [ 2191.637632][ T9881] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2594/file0 supports timestamps until 2107 (0x10391447e) 07:01:46 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) [ 2191.752376][ T9902] loop5: detected capacity change from 0 to 255 [ 2191.764656][ T9902] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2191.764889][ T9902] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2595/file0 supports timestamps until 2107 (0x10391447e) 07:01:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x0) 07:01:46 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 07:01:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040000e0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000100)="b7459d304e8476add7606246cb95fa1615b4e2ddf992a64173440d3a09a8fd6a4ff676d1dcb80ab51f76a8e64017c9f70bac3a247fc4bfca204754dcfc01d3e550fe2f5f4058191bac61e9aa2e5b21d59ec6b521644abf0c50b75071da6f64a22d53c47ca7e7c0822c50b8701ff89097c2987ff22bb5c80cead5dcfb4739998be89c994659f4e667b1455d47845751ccf9", 0x91, 0x8, 0x0, 0x0) 07:01:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9e03}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:46 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) fsync(r0) 07:01:46 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001b80)={&(0x7f0000000200)=@abs, 0x8, &(0x7f0000001840)=[{&(0x7f0000000240)="07bead72c74a55f052f419ce0e0c32a9888cbc4717283dc5fb9dac8c70ca4c961f64b4e3216908da2946b75eaeee16ecdb1e5fd4a4ffa9247d2927341afb7c4b50a663f91200889e26c89f5063749875edb1a2915851a4cab75b98f52e385a216ef754d618b33b25c83fdc17a8602816260b95faea86191e2b31cf3e2d3552cf22cfe89e849b7212b063d3bb986803fb8d277bacb0267241b1d0df86e7f91519", 0xa0}, {&(0x7f0000000300)="dad463ebb64f26ecfd54e93b8ed3940e948259e65718b9d25c590b81fbb51967c03cba034d8af6f2e2cb0a60d1f174f35c2905e5e1f9e1b3c5c7c6f938a5519e354f7ef96d4a4ce948f224003c982d59ee5bd6693155e605135e09e6f49449f79baa09a0653440c14f446bafb4070f10b78911a824e646bca7308811230ca7054b2c1caf918f60cb05684f337c29ddf014f649dfd60c271b337b0572c88b38eda13a7db25270b9d9f1bdf01a7e9f0a43881e319b85d4f6f20a8e9f03ad9f0f8a2543ef31b0d480f348a7ba2b6c", 0xcd}, {&(0x7f0000000400)="7344dd110c0985445c8c09b6b6bd1215f31541ac5727156826c3e74a4f2f95c5cb67a14b5aa54df6005364115aff0d08c1c356c461fc999a723c5f6550d10ffa2ae43fb772be979eb312190af10e99abba0b8a2d438166e8d65bee9f42a6ba4073a0d197e35866ffec6c2d8a83d8b037e285fa6c30fc02fdfc2915832e2b1b8359c4d35172cd06141d2ec4aacd5edcd12f651e8231736167771fcc56637c9ccf1766a69d3a439b49", 0xa8}, {&(0x7f00000004c0)="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", 0x5ec}], 0x4}, 0x0) 07:01:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9f03}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000000480)=[{&(0x7f0000000140)="58a0f01d4d17d800a7051c489ac894633b5f6f4426b7b6602b72551055aa91bba3d2c97ef74cff4e1d3d800f1e4ef36c5c8b85feeab17943ea1a24a6e6b32d2dd199667790c1914be6e390eb858b638cb20d8ed207400504427c0dddce39a7ac85c6a9923ac317b229dc5f78944a0e87a3326204736c51d1c09ae985238f172ac9218d2e3e0036317509b9a96cd8389361", 0x91}, {0x0}], 0x2}, 0x0) [ 2191.931094][ T9920] loop5: detected capacity change from 0 to 255 07:01:46 executing program 4: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:46 executing program 1: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) 07:01:46 executing program 2: clock_gettime(0x0, &(0x7f0000000000)) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) 07:01:46 executing program 0: getegid() r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000021c0), 0x282a40, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) [ 2191.977811][ T9920] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 2192.006018][ T9920] vfat filesystem being mounted at /root/syzkaller-testdir296854287/syzkaller.OON6zF/2596/file0 supports timestamps until 2107 (0x10391447e) 07:01:46 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040010e0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:46 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa003}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:46 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 07:01:47 executing program 4: set_mempolicy(0x0, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 1: fchmodat(0xffffffffffffffff, 0x0, 0x76019ff45ec8f1a4) 07:01:47 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa103}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040000f0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 0: shmget(0x1, 0x1000, 0x0, &(0x7f0000fff000/0x1000)=nil) 07:01:47 executing program 1: pwritev(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0, 0xfffffffffffffd15}], 0x1, 0x0, 0x0) 07:01:47 executing program 4: set_mempolicy(0x0, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa203}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 0: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000080)=""/149}, {&(0x7f0000000140)=""/144}, {&(0x7f0000000340)=""/91}, {&(0x7f00000003c0)=""/83}], 0x1000000000000398) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004020100000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0x18, 0x2}, 0xc) 07:01:47 executing program 1: msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa303}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 4: set_mempolicy(0x0, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x20, &(0x7f0000000000), 0x4) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000110000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 0: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080)={{0x0, 0xffffffffffffffff}}, 0x0) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa403}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) poll(&(0x7f0000000000)=[{r0, 0x1}, {r0, 0x1}], 0x2, 0x0) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000120000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa503}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 1: r0 = socket$inet6(0x18, 0x3, 0x0) ftruncate(r0, 0x0) 07:01:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) chown(&(0x7f0000000040)='./file0/file0\x00', 0xffffffffffffffff, 0xffffffffffffffff) 07:01:47 executing program 4: set_mempolicy(0x4001, 0x0, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1, &(0x7f0000000040), 0x4) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000180000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa603}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:01:47 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) setsockopt(r0, 0x0, 0x0, &(0x7f0000000180)="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", 0xfffffffffffffe49) 07:01:47 executing program 4: set_mempolicy(0x4001, 0x0, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000190000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xedc0}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) 07:01:47 executing program 1: socket$inet6(0x18, 0x2, 0x0) 07:01:47 executing program 4: set_mempolicy(0x4001, 0x0, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000200000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xfeff}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@in6={0x18}, 0xc) 07:01:47 executing program 0: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, 0x0, 0x0) 07:01:47 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x1}, 0xc) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004010200000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140), 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001280)=[{&(0x7f0000000040)=""/98, 0x62}, {&(0x7f00000013c0)=""/67, 0xfffffffffffffe28}, {&(0x7f0000000100)=""/199, 0xc7}, {&(0x7f0000000200)=""/4088, 0x1000}, {&(0x7f0000001200)=""/98, 0x62}], 0x5, 0x0, 0x0) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xff0f}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 2: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000014c0)) mlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000220000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) poll(&(0x7f0000000180)=[{r0, 0x4}], 0x1, 0x8) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000250000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x20a00, 0x0) 07:01:47 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140), 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xfffe}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004085270000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 2: socketpair(0x18, 0x3, 0xff, 0x0) 07:01:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000200)="e6081c5e91c00842a8bd19f7976e0617f2e9827a2bc14876340ca6c2808d0ee1aa93377a83812df6c836b8acd03269112cf3cb00ba7794d605ef67b73bedf6c2d527c8e46a19cef69cbf7b5a0daf85c40dace949223f66892da9e47cfa8dbd4837179329e674ad101d0b68c5d94913cfa472bc92e7638851faf286b72f54762b6b24cdfc28b35f066a7ea6a090e7832746", 0x91}], 0x2}, 0x0) 07:01:47 executing program 0: poll(0x0, 0x0, 0xffffff8e) 07:01:47 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGETD(r0, 0x4004741a, &(0x7f0000000000)) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x20000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004088270000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 1: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) 07:01:47 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140), 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040003f0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x20400}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200, 0x0) readlink(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 07:01:47 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:47 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000400000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) poll(&(0x7f0000000000)=[{r0, 0x1}, {r0, 0x4}, {r0, 0x2}], 0x3, 0x0) 07:01:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000002100)='fdinfo\x00') read$eventfd(r0, 0x0, 0x0) 07:01:48 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:48 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x40000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:48 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) write(r0, 0x0, 0x0) 07:01:48 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001540)={&(0x7f00000000c0)=@abs, 0x8, &(0x7f0000001440)=[{&(0x7f0000000200)="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", 0x784}], 0x1}, 0x0) 07:01:48 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000480000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:48 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x40200}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:48 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040004c0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:48 executing program 0: semget$private(0x0, 0x1, 0x86) 07:01:48 executing program 1: renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2) 07:01:48 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x407fe}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:48 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000140)='./file0\x00', 0x100) 07:01:48 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:48 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x230000c0) 07:01:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f00000042c0)='./file0\x00', 0x1000, 0x10, &(0x7f0000004300)) 07:01:48 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000600000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:48 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:48 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x407ff}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:48 executing program 2: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000002200)='.log\x00', 0xc2442, 0x0) write$P9_RFSYNC(r0, 0x0, 0xfffffffffffffe86) 07:01:48 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x80, &(0x7f0000000180)) 07:01:48 executing program 1: mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) 07:01:48 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:48 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004002610000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:48 executing program 1: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTATFS(r0, 0x0, 0x0) 07:01:48 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:48 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x40800}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:48 executing program 2: semget$private(0x0, 0x1, 0x608) 07:01:48 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0x20, 0x0, 0x0) 07:01:48 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:48 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000680000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:48 executing program 1: creat(&(0x7f0000000180)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x4000, 0x800, &(0x7f0000000040)) 07:01:49 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x60000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:49 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x4, &(0x7f0000000040)) 07:01:49 executing program 0: semget$private(0x0, 0x4, 0x58) 07:01:49 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040006c0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:49 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x201, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 07:01:49 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:49 executing program 2: semget$private(0x0, 0x4, 0x65c) 07:01:49 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x80000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:49 executing program 0: r0 = epoll_create1(0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) 07:01:49 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140)=0x140000a16, 0x4) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000200)=0x7fff, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10) renameat(0xffffffffffffffff, 0x0, r1, &(0x7f00000001c0)='./file0\x00') setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0xc6dd, 0xf087}, 0x14) splice(r0, 0x0, r2, 0x0, 0x4ffe1, 0x0) 07:01:49 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000740000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:49 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:49 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x80400}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f00000042c0)='./file0\x00', 0x1000, 0x40, &(0x7f0000004300)) 07:01:49 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f00000042c0)='./file0\x00', 0x0, 0x8, &(0x7f0000004300)) 07:01:49 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:49 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000780000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:49 executing program 2: creat(&(0x7f0000000180)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000040)) 07:01:49 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:49 executing program 0: creat(&(0x7f0000000180)='./file0\x00', 0x0) statx(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x2000, 0x20, &(0x7f0000000040)) 07:01:49 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xc0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:49 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x1c, &(0x7f0000000100)={&(0x7f0000000080)={0x48, 0x8, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x18) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) 07:01:49 executing program 2: semget$private(0x0, 0x1, 0x68d) 07:01:49 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:49 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_io_uring_setup(0x7b98, &(0x7f00000002c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0, 0x0) fork() 07:01:49 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040007a0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:49 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xe0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:50 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004027850000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004027880000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e20, 0xfffffffd, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0xfffffdef, 0x0, 0x0, 0x0, 0x0, 0xffffffe0}, 0x3000000}], 0xaa, 0x0) 07:01:50 executing program 2: r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x38, r0, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x3}}, @DEVLINK_ATTR_NETNS_PID={0x8}}]}, 0x38}}, 0x0) 07:01:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1fffff}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:50 executing program 1: perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000bc0)=[{{0x0, 0x0, &(0x7f0000002400)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ptype\x00') preadv(r0, &(0x7f00000017c0), 0x315, 0x0, 0x0) 07:01:50 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040038a0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:50 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x400000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:50 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:01:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040038b0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:50 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0xc, 0x0, &(0x7f0000000180)) 07:01:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200, 0x78a1c52333bdd777) 07:01:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/vlan/vlan0\x00') preadv(r1, &(0x7f0000000780)=[{&(0x7f0000000300)=""/172, 0xac}], 0x1, 0x0, 0x0) 07:01:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:50 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, 0x0, 0x0) 07:01:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040019e0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:50 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, @scatter={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000640)="ae88bff824f400005a90f501bbfed6033c7c3f07962c22772e11b44e69ffff0000dd2ac8bbe462920000c300ffbfc796", 0x30}, {&(0x7f0000000280)="f5d2aa84fdc0f323d086dd7c135bec8f0a24714f4c7930b7f3e608ae1821a60156c406dedd8cbdb2bec45862c3d35af9", 0x30}], 0x2) 07:01:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x10e0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:50 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x80000, 0x8, &(0x7f0000000200)=[{&(0x7f0000000100)="200000000002000019000100900100000f000000000000000000000004000000000002000020000020000000d8f4655fd8f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000001000018000000c28500002b02", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000900000c000000dff4ef821ec35de5a68f275e28ea4831010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000050040", 0x29, 0x540}, {&(0x7f0000000040)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x3fe, 0xc04}, {&(0x7f0000010d00)="ed41000000040000d7f4655fd8f4655fd8f4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f0000000380)="ed4100003c000000d8f4655fd8f4655fd8f4655f00000000000002000000000000000010", 0x24, 0x1f00}, {&(0x7f00000001c0)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012a00)=ANY=[]) 07:01:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x2, 0x4}, 0x4) 07:01:50 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, 0x0, 0x0) 07:01:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040039e0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:50 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x7b98, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1000}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000080)=[0xffffffffffffffff, r0, 0xffffffffffffffff], 0x3) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x3, 0x0, 0x0) [ 2195.473363][T10315] sg_write: data in/out 603177177/2 bytes for SCSI command 0xdd-- guessing data in; [ 2195.473363][T10315] program syz-executor.0 not setting count and/or reply_len properly 07:01:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040c0ed0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:50 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, 0x0, 0x0) 07:01:50 executing program 2: r0 = memfd_create(&(0x7f0000001980)='\x97&\x89\\\xd0\xe7\xca\xc7ZO\x94:\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf\x13\xe9\xd2\x0f\xc2G\x86\x06\x00\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88j\x16\xeb>\x8c\xa1\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\x02j\x9b}\xc6G\x86\xb2\xdeY\x17yX $\xfcU\x9d\x02\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x00\x00\x81\f\xdd\x8c\x0f\x91Y\x970\x14\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2\x03\x00\xaf\xe1jd\xda\x1f\x8b\x9eVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd3\x1c]ImZlU=\xbd\xbbs\xab\t\x81\xbd.\x18)\xcf\x1am\x14\xb3\x02\aJ\xa8\x0e\xcei\xef]\xdeE%\xa7\xee\xd5\xe0\xdb\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xces\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf1J\xd9\x13Q\x94R/\xdf\x1e#O_\"\xf0\x9f\xdb\xe1\x9e\xe57\xda{\xe1D\x00\x00\x00\x00H\xe6\x0f\xe0]\xef\x8b\xcdk\xfe\xf6\xcc+rp\xd5\b~\xf6\xa2\x87\xed<\xc2bO\x88\x03n% \xf8{^\xd6\xcc\x10\xc1\xb3\x9fAIbR:/q~\xad}\xa1^\xa7\xcd\xe2\xb9\x86\x89\x8e\xf0>\x12\x13\xf5\xe9ho{pI\xac\xbe\x9dBF\xd4\b8\xec\x1d\xde\x1d\xfbO_\xcb G\xc4\'cH\xa8\xcf/\xad\x1d\xbbn\xa6\xe1t<,_\xbcz|0GT\n\xb4\x14\xef\x11&\xb2\xf7\x9d\x81\x9ezJ\x96\xa2\xc2\x7f\xecT\x19o\x1a\xe2|\xe1\xe5\x80\xbf\x1d\xd6\xe04L\xea\xfd\x9b\x1e\xdcx\xd4\x16\x17\xb7\x04\x97*\xf2lty\x0e\x8c4O\xb93\xd7\xbe\xb9\x038\x85\xfcC\x8bQ$\xa1\xa6\x1b\x9fG\xde\x9d2m\xce\x83\x86\xc3,u\x80\xfc\x1d\x81\x96\xb5\xe0\x84C-\xd6\x02\xaeQ\xb8bN\xca,.=\xfc\xd3\xa6UQ$\x16v#\xa4\a\x81R\x96$\xa1uu\xbf\x13\xbd\xe0b/!\xd9\x1b\xb8\x83\xec\x87\xa5', 0x0) fcntl$setlease(r0, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) [ 2195.528052][T10324] sg_write: data in/out 603177177/2 bytes for SCSI command 0xdd-- guessing data in; [ 2195.528052][T10324] program syz-executor.0 not setting count and/or reply_len properly 07:01:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000fb0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:50 executing program 0: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000000c0)) 07:01:50 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x2040000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:50 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0), 0x0) 07:01:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = open(0x0, 0x14d842, 0x0) writev(r0, &(0x7f0000001580)=[{&(0x7f0000000180)="e5", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) syncfs(r0) listen(0xffffffffffffffff, 0x0) 07:01:50 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000fe0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:50 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0), 0x0) 07:01:51 executing program 1: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x68180, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x419e02, 0x89) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x18, 0x400fa7f, 0x4) perf_event_open(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(0x0, 0x0) ftruncate(r1, 0x0) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8400fffffffa) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x3) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:01:51 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:51 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040fffe0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:51 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet_icmp_raw(0x2, 0x3, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r2, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) splice(r0, 0x0, r2, 0x0, 0x2ffff, 0x0) 07:01:51 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0), 0x0) 07:01:51 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_PASTESEL(r0, 0x4b41, &(0x7f00000000c0)) 07:01:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @remote={0xac, 0x10, 0x3}}, @ax25={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x4, 0x0, 0x0, 0x0, 0x201, &(0x7f0000001400)='syz_tun\x00'}) 07:01:51 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x4000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:51 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{0x0}], 0x1) 07:01:51 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000ff0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:51 executing program 1: perf_event_open(&(0x7f000025c000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="5500000018007fd500fe01b2a4d180930a06000000a843089100fe803900080008000a0000dc13382d0010009b7a136ef75afbc9bff7de5cf25fa8e178f5448daa72540d8102d2c55327c43ab82286ef1fdd206523", 0x55}], 0x1}, 0x0) socket$nl_route(0x10, 0x3, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/4096, 0x1000) syz_open_procfs(0x0, 0x0) 07:01:51 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400fff0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:51 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x5000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:51 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{0x0}], 0x1) 07:01:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x2000}, 0x4) 07:01:52 executing program 0: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) openat$vcsu(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x419e02, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x18, 0x400fa7f, 0x4) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60446, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x200, 0xfff, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0xffff, 0x0, 0x6}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x8400fffffffa) 07:01:52 executing program 1: r0 = syz_io_uring_setup(0x7b98, &(0x7f00000002c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000080)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 07:01:52 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x6000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:52 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040feff0000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:52 executing program 4: set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{0x0}], 0x1) 07:01:52 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_io_uring_setup(0x7b98, &(0x7f00000002c0), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000080)=[0xffffffffffffffff], 0x1) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x3, 0x0, 0x0) 07:01:52 executing program 1: syz_open_dev$evdev(0xfffffffffffffffc, 0x0, 0x808c2) 07:01:52 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x6040000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:52 executing program 4: syz_open_dev$evdev(0xfffffffffffffffc, 0x0, 0x0) 07:01:52 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000200000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:52 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x7000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:52 executing program 0: syz_open_dev$evdev(&(0x7f0000002180), 0x7fffffff, 0x0) syz_open_dev$evdev(&(0x7f0000002340), 0x0, 0x1) 07:01:52 executing program 1: syz_open_dev$evdev(0xfffffffffffffffc, 0x80000000000000, 0x447c2) syz_open_dev$evdev(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x12042) 07:01:52 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000400000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, 0xffffffffffffffff) 07:01:52 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x8000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:52 executing program 4: syz_open_dev$evdev(0xfffffffffffffffc, 0x0, 0x447c2) 07:01:52 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000024c0), 0x0, 0x280000) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) 07:01:52 executing program 1: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/softnet_stat\x00') 07:01:52 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000600000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:52 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000380)={'batadv_slave_1\x00'}) 07:01:52 executing program 4: syz_open_dev$evdev(&(0x7f0000002340), 0x1800, 0x0) syz_open_dev$evdev(&(0x7f0000002480), 0x4, 0x1) 07:01:52 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:53 executing program 4: syz_open_dev$evdev(&(0x7f00000016c0), 0x4, 0x101202) 07:01:53 executing program 2: syz_open_dev$evdev(&(0x7f0000001a00), 0x0, 0x100140) 07:01:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:01:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000800000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:53 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80) 07:01:53 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa19, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f28d00000173d5e822a7632200"}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x1, 0x0, 0x1}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000180)='./file0\x00', 0x19) write$binfmt_script(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="230228be73a21ad1035d9191b967045737655231dbd54bebb258237f2a56e377b1664c9bbca78fb95cac851e9f9957e6df5910be1479c0fcd3cfd7330d03d828fd22416abbae9786d8e67435329abda6e445acaeb4deeea0b1b7acac484277348c8772c617f8b7a0ddad336210ace210b6c9b34ec07f35175f68acb355924d729e067377e249403ae27819d71d5b1451e08a664ee06c1a1308a5bcb263b6c682c18a2674058bc9c6d4c6adb4823b91016a4ea973f19b88d5038681b76c8280019f8c5fb303f05e8be61f80f6fafa21701b546e438b560400d711e71c033ccc13a39bf75a4d1788c8c4467077e32722d80200000022da1aa51ea6ca673e515b39362266323639575f7a27c0128edb0aa627524f624921010e3982a5ac90b6ccc26c1eb79a6dbcb0a200faa2d61a753967c2f8debb8915b9fbf82eb734e43cf1c7f96b96372be7d6a25df2f4fc8a1628c90400adf58f3740e907000ccbe64e000000009e2d4e6924854b468da5f8bb631c30a169a289af70b49cab5c8831d24e9e703a891bf5d2ed5f9e2d0f365fe7d4cc264c567210bedc85528d66293262c9fb02e81a2082b8ab02dea29ee416598f95eac6f60a15c972ef7288d2a9d64031e6a2adf9f56dbdd8779b8d3c7f247008793f915571222ae1ef1c6a3a82e95c401569300bef197f14e2a6be4432ede834b52da252f1577681b941bb0935188115842d0894104f7e336ac2723c0bc92f703506000000000000005ddf5a27a7532f7428265c17c35d7c5976f600"/568], 0x141) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) close(r4) clone(0x2040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 07:01:53 executing program 2: gettid() syz_mount_image$nfs(&(0x7f0000001a00), 0x0, 0x0, 0x4, &(0x7f0000002f80)=[{&(0x7f0000001a80)="c4de35fa76d732ff70b9d2e6f964d8ae02f855aed642007be202e46ef5f605c5d9", 0x21}, {&(0x7f0000001b40), 0x4000000, 0x8000}, {0x0}, {&(0x7f0000002d40)}], 0x0, &(0x7f0000003080)={[{'broadcast-link\x00'}, {']#(Q%'}, {'syz0\x00'}], [{@seclabel}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'net/icmp\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':$*[\'-\\^'}}, {@smackfsdef={'smackfsdef', 0x3d, '*'}}]}) 07:01:53 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname$inet6(r0, 0x0, &(0x7f0000000140)) 07:01:53 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='sit0\x00', 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000080), 0xa4f0, 0x400000000000000, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0x409f0000}, 0x10) 07:01:53 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xb000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000a00000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:53 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan1\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f0000000080)='./file0\x00') 07:01:53 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xb0a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:53 executing program 4: mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) 07:01:53 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') 07:01:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000c00000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:53 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xc000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='virtiofs\x00', 0x0, 0x0) 07:01:53 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 07:01:53 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000f40)=@in6={0xa, 0x4e21, 0x0, @private1, 0xadf}, 0x80) 07:01:53 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000e00000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:53 executing program 0: gettid() r0 = gettid() perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, 0xa5c1307cd3348c94, @perf_config_ext={0x1000399}, 0x41c41, 0x0, 0x200, 0x5, 0x0, 0x2ca, 0x107, 0x0, 0x0, 0x0, 0x7}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$nfs(&(0x7f0000001a00), 0x0, 0x0, 0x1, &(0x7f0000002f80)=[{0x0}], 0x104809, &(0x7f0000003080)={[{'syz0\x00'}, {'-'}], [{@euid_lt={'euid<', 0xee01}}, {@seclabel}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'net/icmp\x00'}}]}) 07:01:53 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xc0a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:54 executing program 1: sigaltstack(&(0x7f0000ffe000/0x2000)=nil, 0x0) 07:01:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[], 0x2e8}}, 0x0) 07:01:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040ffff1f00000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:54 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) read$ptp(r0, &(0x7f00000007c0)=""/250, 0xfa) 07:01:54 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xd000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001440)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000008db7e1f19a07b4621ca1de25d2100300003b00000008002300", @ANYRES32=r1, @ANYBLOB="26003300d8040000ffffffb609ff080211000425030000003e010000000000000000000000000000dbfbb69eb7d50a5779e9e183c9ca1251c48bf1a7526068d519e2af44e841ab200d340b4e2e87b35d20cc1fc61d31724d45950a87e6f65f3e831358395c626c87b2988abf75cfe66401f0590c179e41e2cbaadbad2edb85edf61c14ed582bbfe0127f2026b9a99c00770c0ec734e77ef348e59d64f68eae9b4686aba1176fb6b9c8cccaf9459a124c401fa328e163856946"], 0x44}}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) unshare(0x22020000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='rpc_pipefs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r3, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r3, &(0x7f0000000080)='./file0\x00') 07:01:54 executing program 4: sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0xa016cd40af5834ee) 07:01:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000004000000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:54 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xd0a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000f40)=@in6={0xa, 0x4e21, 0x0, @private1}, 0x80) 07:01:54 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd/3\x00') 07:01:54 executing program 2: r0 = gettid() syz_open_procfs(r0, 0x0) syz_open_procfs(r0, 0x0) 07:01:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000001000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:54 executing program 2: readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000080)=""/40, 0x28) 07:01:54 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}) 07:01:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000e01000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:54 executing program 4: syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x545c80) 07:01:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname$inet6(r0, 0x0, 0x0) 07:01:54 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xe000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:54 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x13) 07:01:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x0, 0x2, &(0x7f0000000080)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240040000f801", 0x17}, {0x0, 0x0, 0x100600}], 0x0, &(0x7f0000000140)={[{@fat=@showexec}]}) 07:01:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000002000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:54 executing program 4: unlinkat(0xffffffffffffffff, 0x0, 0x26c49c4956afc106) 07:01:54 executing program 4: syz_mount_image$nfs(&(0x7f0000001a00), 0x0, 0x0, 0x4, &(0x7f0000002f80)=[{&(0x7f0000001a80)="c4de35fa76d732ff70b9d2e6f964d8ae02f855aed642007be202e46ef5f605c5d9", 0x21}, {&(0x7f0000001b40), 0x68000000}, {0x0}, {&(0x7f0000002d40)}], 0x0, &(0x7f0000003080)={[{'broadcast-link\x00'}, {']#(Q%'}, {'syz0\x00'}], [{@seclabel}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'net/icmp\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':$*[\'-\\^'}}, {@smackfsdef={'smackfsdef', 0x3d, '*'}}]}) 07:01:54 executing program 0: syz_mount_image$nfs(&(0x7f0000001a00), 0x0, 0x0, 0x4, &(0x7f0000002f80)=[{&(0x7f0000001a80)="c4de35fa76d732ff70b9d2e6f964d8ae02f855aed642007be202e46ef5f605c5d9", 0x21}, {&(0x7f0000001b40), 0x100000000000000}, {0x0}, {&(0x7f0000002d40)}], 0x0, &(0x7f0000003080)={[{'broadcast-link\x00'}, {']#(Q%'}, {'syz0\x00'}], [{@seclabel}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'net/icmp\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':$*[\'-\\^'}}, {@smackfsdef={'smackfsdef', 0x3d, '*'}}]}) 07:01:54 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xe0a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:54 executing program 1: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x1, &(0x7f0000000180)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) fallocate(r2, 0x0, 0x0, 0x1000f4) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) io_submit(r1, 0x45, &(0x7f0000000540)=[&(0x7f00000000c0)={0x101010, 0x2c, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 07:01:54 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000402000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet6(r0, 0x0, 0x0, 0x0) 07:01:54 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xf000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000003000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x0) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xf0a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 2: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000000c0), 0x42000, 0x0) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000004000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r0, &(0x7f0000000000)="bb1d6df72a8667dc14372a9f2b3e6ca3", 0x10, 0x0, 0x0, 0x0) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x10000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 2: syz_mount_image$nfs(&(0x7f0000001a00), 0x0, 0x0, 0x1, &(0x7f0000002f80)=[{&(0x7f0000001a80)="c4", 0x1, 0xf0ffffff7f0000}], 0x0, &(0x7f0000003080)) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000005000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2) 07:01:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x4, "21095990"}, &(0x7f0000000140)=0x28) 07:01:55 executing program 1: waitid(0x1, 0x0, &(0x7f0000000180), 0x8, 0x0) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x100a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000006000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@dev}, &(0x7f00000000c0)=0x20) 07:01:55 executing program 0: gettid() syz_mount_image$nfs(&(0x7f0000001a00), 0x0, 0x0, 0x4, &(0x7f0000002f80)=[{&(0x7f0000001a80)="c4de35fa76d732ff70b9d2e6f964d8ae02f855aed642007be202e46ef5f605c5d9", 0x21}, {&(0x7f0000001b40), 0x1f000000, 0x8000}, {0x0}, {&(0x7f0000002d40)}], 0x0, &(0x7f0000003080)={[{'broadcast-link\x00'}, {']#(Q%'}, {'syz0\x00'}], [{@seclabel}, {@dont_hash}, {@subj_user={'subj_user', 0x3d, 'net/icmp\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, ':$*[\'-\\^'}}, {@smackfsdef={'smackfsdef', 0x3d, '*'}}]}) 07:01:55 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000480)='stack\x00') waitid(0x0, 0x0, &(0x7f00000002c0), 0x0, 0x0) 07:01:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000180)={@mcast1}, 0x14) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x11000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000406000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@dev, 0x0, 0x0, 0x0, 0xa}, &(0x7f00000000c0)=0x20) 07:01:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:01:55 executing program 4: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$PTP_PIN_SETFUNC2(r0, 0x40603d10, &(0x7f0000000080)) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000007000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000003c0)={@private0}, 0x14) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x110a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:01:55 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000700)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, 0x0, 0x0) 07:01:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) sendto$inet(r0, &(0x7f0000000040)="e380f0152a97b06c0adfac6e65aa1dabf2f70a4990bddd4eee116010377e0ef2ddd320a88cb2a514e03c00bc12b32b1ece3bbe84cb805d8ab6530d5637ce7ef4deca4320874848d08c267a1a1269f1560a8ea526de41f4c5a2c1f2833c551a31049005486d2ad55e94420ef21d927ee0e65b", 0x72, 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) shutdown(r0, 0x1) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000008000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x12000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 2: r0 = open$dir(&(0x7f0000000180)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000600)='./file0\x00', 0x0) r1 = getegid() lchown(&(0x7f0000000680)='./file0\x00', 0xffffffffffffffff, r1) 07:01:55 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000700)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet(r2, 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE(r3, 0x5451, 0x0) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000009000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x120a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 4: r0 = open(&(0x7f0000000340)='./file1\x00', 0x1433c2, 0x0) ftruncate(r0, 0x2210004) sendfile(r0, r0, 0x0, 0xf10081) truncate(&(0x7f0000000040)='./file1\x00', 0x0) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='com.apple.system.Security\x00') 07:01:55 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000700)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept$inet(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, 0x0, 0x0) 07:01:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000640)}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000080)=""/47, 0x2f}, {0x0, 0x3a0}], 0x2) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0x342) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000a40)=[{0xffffffffffffffff, 0x3a}, {r0, 0x2201}, {0xffffffffffffffff, 0x3008}, {0xffffffffffffffff, 0x4808}, {0xffffffffffffffff, 0x3000}], 0x5, 0xd54a) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000000a000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x130a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000640)}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000080)=""/47, 0x2f}, {0x0, 0x3a0}], 0x2) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0x342) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000a40)=[{0xffffffffffffffff, 0x3a}, {r0, 0x2201}, {0xffffffffffffffff, 0x3008}, {0xffffffffffffffff, 0x4808}, {0xffffffffffffffff, 0x3000}], 0x5, 0xd54a) 07:01:55 executing program 2: r0 = msgget(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 07:01:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000100)={0x0, 0x9, &(0x7f0000000080)="dd92a60963980b4009"}) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000000b000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x140a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 4: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000000240), 0x8) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$eventfd(r0, &(0x7f0000000040), 0x8) 07:01:55 executing program 2: syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0xa00) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x150a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 1: syz_open_dev$evdev(&(0x7f0000000000), 0xffffffffffffffff, 0x105a40) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000000c000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000640)}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000080)=""/47, 0x2f}, {0x0, 0x3a0}], 0x2) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0x342) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000a40)=[{0xffffffffffffffff, 0x3a}, {r0, 0x2201}, {0xffffffffffffffff, 0x3008}, {0xffffffffffffffff, 0x4808}, {0xffffffffffffffff, 0x3000}], 0x5, 0xd54a) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x160a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000340), 0x0, 0x20402) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000640)}], 0x1) readv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000080)=""/47, 0x2f}, {0x0, 0x3a0}], 0x2) write$binfmt_aout(r0, &(0x7f0000000380)=ANY=[], 0x342) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) poll(&(0x7f0000000a40)=[{0xffffffffffffffff, 0x3a}, {r0, 0x2201}, {0xffffffffffffffff, 0x3008}, {0xffffffffffffffff, 0x4808}, {0xffffffffffffffff, 0x3000}], 0x5, 0xd54a) 07:01:55 executing program 2: syz_open_dev$evdev(&(0x7f0000000440), 0xfffffffffffffffe, 0x0) 07:01:55 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000000d000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:55 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x170a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:55 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x5, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 07:01:56 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigprocmask(0x0, &(0x7f0000000080)={[0xfffffffffffffffb]}, 0x0, 0x8) splice(r0, 0x0, r1, 0x0, 0x200, 0x0) 07:01:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000400)={0x0, @rc={0x1f, @none}, @ethernet={0x0, @broadcast}, @phonet}) 07:01:56 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0) 07:01:56 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x18000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000000e000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:56 executing program 1: r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)=ANY=[], 0xffffffe3) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) lseek(r1, 0xfffeffffffffffef, 0x4) 07:01:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000001600), 0x7, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) 07:01:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000000f000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:56 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x180a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}, 0x0) 07:01:56 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000010000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:56 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x19000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000e80), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r0, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)={&(0x7f00000003c0)={0x3c, r1, 0x1, 0x0, 0x0, {0x7}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}]}, 0x3c}}, 0x0) 07:01:57 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736672d59600088001000240000004f801002000400000000000000000008000"/64, 0x40}, {&(0x7f0000010100)="f8ffff00f0ffffffffffffff00"/32, 0x20, 0x800}, {&(0x7f0000010200)="f8ffff00f0ffffffffffffff00"/32, 0x20, 0x1000}, {&(0x7f0000010300)="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", 0x120, 0x1800}, {&(0x7f0000010500)="2e2020202020202020202010000eeb70325132510000eb7032510300000000002e2e20202020202020202010000eeb70325132510000eb70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c453020202020202020000eeb70325132510000eb70325104001a040000", 0x80, 0x42000}, {&(0x7f0000010600)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x82000}, {&(0x7f0000010b00)='syzkallers\x00'/32, 0x20, 0xc2000}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x142000}], 0x0, &(0x7f0000010d00)) 07:01:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000011000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0xffc00004, 0x2, &(0x7f0000000100)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x65}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000080)={[{@fat=@nocase}]}) 07:01:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x190a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000470008000f80100200040000300000000000000800029f95845f153595a4b414c4c4552202046415431362020200e1fbe5b7cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a00", 0xc0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aaf8fffffff0ffffffff078000ffffff00"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="f8fffffff0ffffffff078000ffffff00"/32, 0x20, 0x400}, {&(0x7f0000010300)="f8fffffff0ffffffff078000ffffff00"/32, 0x20, 0x600}, {&(0x7f0000010400)="f8fffffff0ffffffff078000ffffff00"/32, 0x20, 0x800}, {&(0x7f0000010500)="53595a4b414c4c45522020080000e880325132510000e880325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020100061e870325132510000e870325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c4531202020202020200061e870325132510000e870325105000a00000041660069006c00650032000f00140000ffffffffffffffffffff0000ffffffff46494c4532202020202020200061e870325132510000e870325106002823000041660069006c0065002e000f00d263006f006c0064000000ffff0000ffffffff46494c457e312020434f4c200061e870325132510000e8703251090064000000", 0x120, 0xa00}, {&(0x7f0000010700)="2e20202020202020202020100061e870325132510000e87032510300000000002e2e202020202020202020100061e870325132510000e870325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200061e870325132510000e870325104001a040000", 0x80, 0x2800}, {&(0x7f0000010800)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x3800}, {&(0x7f0000010d00)='syzkallers\x00'/32, 0x20, 0x4800}, {&(0x7f0000010e00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x8800}], 0x0, &(0x7f0000010f00)) 07:01:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000012000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:57 executing program 2: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) socket(0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x18, 0x400fa7f, 0x4) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000140)) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.log\x00', 0x41, 0x132) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000500)}], 0x2) 07:01:57 executing program 4: recvmsg(0xffffffffffffffff, 0x0, 0x2051a67fc236542d) 07:01:57 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="00ae010094e71b20a1f10700000036f4d8e43beb3fe2299238e4db286ae855b637c54602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa354e90000ec9968027531eaa9c0a17c0493003e3257a1c7724118257aaaec367c2876b8b405ac95238aa78b9a1d2a1161bc8adcd61f7c863bb32c5f742d3457260989f521cd3b54cdd92824c88d96a12c32cd64df60879dfe5430494dca0f209821e23f26befea54ccac06f44c82d922aa7da582c4d52112160cce113d481cc1c3a12a3a774b1a72a0a978938f8c4f328b042a4d9ae", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:01:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1a0a0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 1: clone3(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x89) 07:01:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000018000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:57 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xfffffdbb) 07:01:57 executing program 2: syz_io_uring_setup(0x0, &(0x7f00000008c0), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000940), &(0x7f0000000980)) 07:01:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x1f000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000019000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:57 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x24681, 0x0) 07:01:57 executing program 4: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0xe000) 07:01:57 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7) socket(0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x18, 0x400fa7f, 0x4) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(r0, 0x0, 0x41, 0x132) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 07:01:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x20000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r1, &(0x7f0000000540), 0x0, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x24002da8) preadv(0xffffffffffffffff, 0x0, 0x0, 0x2, 0xfffffff7) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000002c40)={'vcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00', @ANYRES16, @ANYBLOB, @ANYRES32=r3, @ANYBLOB="0c0003800800020000000000"], 0x2c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYRESDEC=r1, @ANYRES16=r3, @ANYRES64=0x0], 0x3}}, 0x40025) 07:01:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000020000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000140)={[{@init_itable_val}, {@stripe={'stripe', 0x3d, 0x8}}]}) 07:01:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x20100000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000001020000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$lock(r0, 0x40e, 0x0) 07:01:57 executing program 1: semctl$GETVAL(0x0, 0xa2c233cead56d3b1, 0xc, 0x0) 07:01:57 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x7) socket(0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x18, 0x400fa7f, 0x4) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x41, 0x132) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000280)="64fda3c58b0fa730a2aa7787f7ed1ca343efa7e8789bb4f46bd375be1bc242c08a868a4ac1e7780124d56477c7457206c41ff683622907f2f57314f9c9e07fb900ba", 0x42}, {&(0x7f0000000500)="238551c8e2ac27e64dab7d49e3beb365f384e6bd9db10b2c91e6e14764e81a9a60d478fdb961ea1c9c6bd77a88a169ac96d3300a05696be1ebbbbbf6c0dbbb8d838edabb3d5adcb76c6aa2e5a53b935015f7b739a349abba9a519d83bfb47fe146efdd01e7fd1fc9d4c7fb346e7d71b55b7554dd88fd97599d82d126758d4ee4277b772f31c0b21ca0fe52ee098acbbd8e509ceb61acc85b3ad027dc6416bc2cdd0913627443b2d8bb59fd10b2ae16f3d0c28bc921853b0d1f2e832e990f0dd7e3bb27efdee8145828d3e9d8acee91e49c878dc798f94125ceaa55589a693a2241c1d0744dfc1670", 0xe8}], 0x2) 07:01:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x22000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt(r0, 0x1, 0x8, 0x0, &(0x7f0000000300)) 07:01:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x25000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:01:57 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:01:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000022000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x2}) 07:01:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$lock(r0, 0x402, 0x0) 07:01:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x3f000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x178) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x7fff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x80000004000000) 07:01:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000025000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$lock(r0, 0xa, &(0x7f0000000000)) 07:01:57 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:01:57 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x40000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:57 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000003f000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:57 executing program 2: socket(0x2, 0x0, 0x200) 07:01:58 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:01:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000040)={'vlan0\x00', @ifru_map}) 07:01:58 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000040000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:58 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x48000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8982, &(0x7f0000000000)={0x7, 'vcan0\x00'}) [ 2204.013075][T10873] ================================================================== [ 2204.021146][T10873] BUG: KCSAN: data-race in ext4_sync_file / writeback_single_inode [ 2204.029022][T10873] [ 2204.031323][T10873] write to 0xffff88813a5af318 of 8 bytes by task 10882 on cpu 0: [ 2204.039012][T10873] writeback_single_inode+0x148/0x3c0 [ 2204.044369][T10873] sync_inode_metadata+0x57/0x80 [ 2204.049284][T10873] ext4_sync_file+0x359/0x670 [ 2204.053942][T10873] vfs_fsync_range+0x107/0x120 [ 2204.058733][T10873] ext4_buffered_write_iter+0x39c/0x3f0 [ 2204.064255][T10873] ext4_file_write_iter+0x2e7/0x11d0 [ 2204.069532][T10873] do_iter_readv_writev+0x2cb/0x360 [ 2204.074707][T10873] do_iter_write+0x112/0x4c0 [ 2204.079289][T10873] vfs_iter_write+0x4c/0x70 [ 2204.083768][T10873] iter_file_splice_write+0x40a/0x750 [ 2204.089119][T10873] direct_splice_actor+0x80/0xa0 [ 2204.094034][T10873] splice_direct_to_actor+0x345/0x650 [ 2204.099383][T10873] do_splice_direct+0xf5/0x170 [ 2204.104123][T10873] do_sendfile+0x773/0xda0 [ 2204.108529][T10873] __x64_sys_sendfile64+0xf2/0x130 [ 2204.113630][T10873] do_syscall_64+0x3d/0x90 [ 2204.118021][T10873] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2204.123890][T10873] [ 2204.126189][T10873] read to 0xffff88813a5af318 of 8 bytes by task 10873 on cpu 1: [ 2204.133788][T10873] ext4_sync_file+0x294/0x670 [ 2204.138439][T10873] vfs_fsync_range+0x107/0x120 [ 2204.143181][T10873] ext4_buffered_write_iter+0x39c/0x3f0 [ 2204.148700][T10873] ext4_file_write_iter+0x2e7/0x11d0 [ 2204.153960][T10873] do_iter_readv_writev+0x2cb/0x360 [ 2204.159135][T10873] do_iter_write+0x112/0x4c0 [ 2204.163721][T10873] vfs_iter_write+0x4c/0x70 [ 2204.168199][T10873] iter_file_splice_write+0x40a/0x750 [ 2204.173546][T10873] direct_splice_actor+0x80/0xa0 [ 2204.178459][T10873] splice_direct_to_actor+0x345/0x650 [ 2204.183832][T10873] do_splice_direct+0xf5/0x170 [ 2204.188572][T10873] do_sendfile+0x773/0xda0 [ 2204.192970][T10873] __x64_sys_sendfile64+0xf2/0x130 [ 2204.198059][T10873] do_syscall_64+0x3d/0x90 [ 2204.202472][T10873] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2204.208342][T10873] 07:01:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x4c000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:59 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:01:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004052526141000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:59 executing program 4: capget(&(0x7f0000000740)={0x19980330, 0xffffffffffffffff}, 0x0) 07:01:59 executing program 2: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r0, 0x1, &(0x7f0000003400)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7, 0x0, r1, &(0x7f0000000080)="303ef2494b82a419b2", 0x9}]) 07:01:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = open(&(0x7f0000000180)='./file0\x00', 0x141042, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x178) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(r1, 0x0, 0x0) sendfile(r0, r0, &(0x7f00000000c0), 0x7fff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x80000004000000) [ 2204.210642][T10873] value changed: 0x0000000000000007 -> 0x0000000000000080 [ 2204.217722][T10873] [ 2204.220028][T10873] Reported by Kernel Concurrency Sanitizer on: [ 2204.226173][T10873] CPU: 1 PID: 10873 Comm: syz-executor.1 Tainted: G W 5.14.0-rc4-syzkaller #0 [ 2204.236296][T10873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2204.246327][T10873] ================================================================== 07:01:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x60000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:59 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:01:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000048000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$lock(r0, 0x40e, &(0x7f0000000000)) 07:01:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x68000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000004c000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:59 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:01:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x6c000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004041615252000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:59 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f", 0xf, 0x800}, {&(0x7f0000010400)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x802, 0x1000}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) socket(0x0, 0x0, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/../file0\x00', 0x419e02, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r1, &(0x7f00000006c0)=[{&(0x7f0000000780)="c3", 0x47fffe0}], 0x18, 0x400fa7f, 0x4) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000140)) openat$incfs(r0, &(0x7f0000000080)='.log\x00', 0x41, 0x132) 07:01:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000006c0), 0xcd, 0x0) dup2(r0, r1) 07:01:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() sendmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 07:01:59 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:01:59 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x74000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:01:59 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000060000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:01:59 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) close(r0) 07:01:59 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200), 0x43400) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000300)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x400000000) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000040), 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) write$cgroup_subtree(r2, 0x0, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 07:02:00 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x26, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x20b000) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000261000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004072724161000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x78000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x7a000000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000068000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x82020000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 2: socketpair(0x2, 0x2, 0x1, &(0x7f0000000840)) 07:02:00 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) close(r0) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003bc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000000080)="fc", 0x1}, {&(0x7f0000000140)="e0", 0x1}], 0x2}, 0x0) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x85270000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000006c000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003bc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x4044090) 07:02:00 executing program 1: r0 = socket(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c}, 0x1c) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x85ffffff}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000080)='vegas\x00', 0x6) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004061417272000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) 07:02:00 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) close(r0) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x8a030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 1: r0 = socket(0x2, 0x3, 0x9) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000002000)) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000074000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 2: r0 = socket(0x2, 0x1, 0x84) sendto(r0, &(0x7f00000001c0)="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", 0x138, 0x1, &(0x7f00000000c0)=@in6={0x0, 0x1c, 0x1}, 0x10) 07:02:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x8cffffff}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000000078000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9a270000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$P9_RRENAME(r0, 0x0, 0xfffffffffffffe37) 07:02:00 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) close(r0) 07:02:00 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000007a000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9b030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) connect$inet(r0, 0x0, 0x0) 07:02:00 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) utimensat(r0, 0x0, &(0x7f00000001c0), 0x0) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000002785000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9c030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/class/power_supply', 0x8040, 0x0) 07:02:00 executing program 1: r0 = shmget$private(0x0, 0x4000, 0x80, &(0x7f0000ff9000/0x4000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000140)=""/45) 07:02:00 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 2: openat$incfs(0xffffffffffffff9c, &(0x7f0000000200)='.log\x00', 0x181440, 0x0) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9d030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040ffffff85000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bind$netlink(r0, 0x0, 0x0) 07:02:00 executing program 2: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RSTAT(r0, 0x0, 0x0) 07:02:00 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f00000000c0)) 07:02:00 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f8000020004000002788000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:00 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9e030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:00 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:00 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 07:02:01 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) 07:02:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000038a000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f00000005c0)) 07:02:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0x9f030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:01 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:01 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x22842, 0x0) write$P9_RAUTH(r0, 0x0, 0x0) 07:02:01 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 07:02:01 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) 07:02:01 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r0 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:01 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000038b000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:01 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa0030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:01 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:02 executing program 1: sendto$inet(0xffffffffffffffff, &(0x7f0000000040)="4d0c72e278f091707a0db81ed2de38100548ec60326c4e351dcba74492cf299bd3802140e1f7b33b8e6ba89577648957f3c951236284ff88f738a5afcfcd9fc8a0ea3e7488a4ae96acd48d1a7f0861d5ae89b2db7bc7c4c6a3f232f7c040addc41885404cf0ccb9c79eaf79f44671457409fbda8efed56b191bdbd736c329b66a7597807dbbfae555648b4da70c99edb753b98b7cdfdd27d9136df932d132068ca13ce685e02", 0xfffffffffffffde6, 0x40, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) 07:02:02 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x0) 07:02:02 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) 07:02:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa1030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040ffffff8c000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000019e000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:02 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, 0x0, 0x0) 07:02:02 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa2030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:02 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000300)='/sys/class/ata_port', 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) 07:02:02 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000039e000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:02 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x0) 07:02:04 executing program 2: shmget(0x2, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 07:02:04 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa3030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000840)) 07:02:04 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)) close(r0) 07:02:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f800002000400000edc0000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:04 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:04 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa4030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040ffffffda000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) 07:02:04 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:04 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa5030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:04 executing program 1: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f000019a000/0xc00000)=nil, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') readv(r0, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 07:02:04 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040fffffff0000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:04 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:07 executing program 0: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:07 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xa6030000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:07 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040fffffff6000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000000340)={0x100000001, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, 0x1}, 0x90) sendmmsg$sock(r1, &(0x7f0000001f00)=[{{&(0x7f0000000240)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000000640)=[{&(0x7f00000002c0)="02b5db8a55fd62c35083bfbef24955b951c5006ab1cff4930f24b42d2910012653cb3f7334b35af602eca02b0f721c94ab76f219a74846452d0ce7c1a70757ebf80fab91f566a7a84c06b4e06c12d06ffa0502f370cf08b5", 0x58}, {&(0x7f00000003c0)="76b63b0632b59e10c7603b3868d6066f91d6aaa6105042e550f8977135e15df4f6f21f29d46a3fe076423e7824ffadae3b0670643d7b53f37fb27d5da318495bd85ded54dfa68f357d8e5b1f39ea2e2d999662797e581abf595c5402e7b77d7d17db939802036e8bc2671a40d91555cc6e01c197021c9c04137dbed40a447abf2c4572c1eb2bc676adda2bd5a8cef00cf54232bfe0d22ca8cfbdd7d9b64b869862203093604f7fb5f1af1207042afee58e6719e938cb43d6509df3549cdedb2fe3209e178f83a0cb31bac2c2d6", 0xcd}, {&(0x7f00000004c0)="7cfab99daf2081a51b7f170b795fb47d5772098bd96219f02998581510cca4b7d6bcd4ac89d99d86e20015855d7d92258b5a086b0ba666a5ef02bbfd8148bbca6051a50c825c0ffbb1cd77fcbe9aa6d3c65c96ea", 0x54}, {&(0x7f0000000540)="d70496beb75a5e3ef4c2805d9082333759522508f479eca15e5682468a2d0f75fb07b515da60ca2732a9d87411a3475a11a8634586c30604ae1e0246799f961a8d90181456294b5a2593b63e133c4c91be4213c07141cb7ac0eac7f5907f26eb3579bb6b19584331e02c120c7bd1a92a8519d38609fc005ee74560af7deb8370214bb5a87fbb3bc7d77cb95a80613631b2962fc254b778d97240688eb2e981a8403979d4b36ad66978979dc984e31007592ec2ebe6e80bac4db4ee7e96677ad79e281d12638ed3", 0xc7}], 0x4}}, {{&(0x7f0000000680)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x1, 0x1, 0x3, 0x2, {0xa, 0x4e22, 0x0, @empty, 0x4}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000700)="911fac8a221ba6f09644bb282bed531b38658651ef7f40a0f378fbdcdb154d38300ae7290cb2b244cb374c68a01b67b84b31b3b9b0b85520b4cf317b4ea0d113278d618c456749e3a37c1ae0f5b3bbe0ecd15410dda4204b022c6da3dfcc75749c2d97873c315a524a1806045626e695dd9a4ba8e23c5469a7f07f455d49e6b2eef85c1efc5133b4cd1d921a179e7f268964f93d", 0x94}, {&(0x7f00000007c0)="98ec299634143e8992939a8a7acbc57bce27030d0d50a0cdcb12225e031d80ccdb9dea972b663a592ff19fff84e0b539802fa834e828ae164207ce4597e3df113c356934c4c1d4a263b9d4988306026a551dd9335a8714914ae632d1cf1f41a30644fba1608f88117d332fc0679978d05146284a036635ff5b959024893029164b3966b099115e7ee29a1e3deb310783934585391519e30ebaed826f909b5bc9885512f4541c7885944aeb559b8acd02b96e532652e7fece78165128826c499f", 0xc0}, {&(0x7f0000000880)="7da192d67095e509ebac99a9d94269606ab7810aaf6741f84997560b3e80ff9793c9437935fa28829d750803f8b64ac1b511ac02a395dcb4ce302174556d544ad30e6fbb0e3940477e9f099968136845824b7badd3070f780824a594a92207dcf61975c9bcd994ab56a5c7430ac6ce9f592aced58072ef69bccea30920d6888955b70eced0a237a3e64a5f67a06b1b837e1a8e4ed3ddbcc744cd3f6e061b7c23fe3cb059046d8ac9f89b6f6e6fa8df61c966cf6e67496b1c580333f892e10d6d132621fb72afc503e8fa5a5c240482cf2e7c1358ae", 0xd5}, {&(0x7f0000000980)="dc2ff77835f5edcd6752ec65c67f892e", 0x10}, {&(0x7f00000009c0)="d0b2a94b1679ad12b77556a06fa7c544d80a083e26825cd3a6926098c3dc4b9d123936346efea88ee5f2a9fa6b5ada2bda4accbb653c46cdce43e07229225549085009b84bff33e4ab32802bdb3c4e2d5e24ac867b3c04b27e15ca223d4113986a57f8ea6f2ac8c12a9bfb0b94575b442ae46a40d5e96117f1216f34a7ff4556", 0x80}], 0x5}}, {{&(0x7f0000000ac0)=@tipc=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x4, 0x4}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000b40)="d6beedf31ba46d558ef5590630e0ee3c20ff8c95b1b8935917e1667847410f93", 0x20}, {&(0x7f0000000b80)="1f89314edd7d251790e9cd151c3c4a0c92768d30a0299d58e86aa039b96c79c18a42563cd5383d797d0b9accda", 0x2d}], 0x2, &(0x7f0000000c00)=[@mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}, @mark={{0x14, 0x1, 0x24, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xf309}}, @mark={{0x14, 0x1, 0x24, 0x5}}], 0x78}}, {{&(0x7f0000000c80)=@can, 0x80, &(0x7f0000001e80)=[{&(0x7f0000000d00)="2a51318829e991d30127f1bc4c0d74b35e729ce407", 0x15}, {&(0x7f0000000d40)="c88cc737578be2af6d8f52f47b", 0xd}, {&(0x7f0000000d80)="883062e2babdb11291a51bada01bac6a3f7d6c8077c61b301793ffadce230281f72c1c4bbfad5c375a0ace6710bc9f32c08104f740f0051d6d4ecaaa8d6a6cc75963687e3e56519480e68bced725c67556881c10555d3cd9d2f7736b5f91b916496423387ca92e75441238c729132863c835a184d0ea88a53368d217fd34402c1ff1de806be6a43cdd440916a2a7189a56b9c2e78e9459270218abeca05b06219b8dc2a5394342d943024bdff9640aa5da741c6455fa337ad7b3deecd1233d2494782ff918d351387d4a76cd5dd8496beb3b77aaf66d6ee9ccb558", 0xdb}, {&(0x7f0000000e80)="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", 0x1000}], 0x4, &(0x7f0000001ec0)}}], 0x4, 0x40) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000000)=@req3={0x5, 0xf, 0x9, 0x7, 0x80000001, 0x1, 0x4}, 0x1c) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_COALESCE(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[@ANYBLOB="c8000000", @ANYRES16=r3, @ANYBLOB="010000000000a7a76500800008000500", @ANYRES32=0x0, @ANYBLOB="ac000e801c000080a1000100a65ad2cc3835d4652c83a3a65d18d42e54c4dc995e11106571e3d1dde5b794bcc2279f15a75c50916b1263ea123f4b2046a2f635965d4f746019fd270eb67b47ac8bd727a7c38d640a34e31e360801acea029fc1b7c3e14bef6338ee3ebdae8468c61a0f1514844761488347d901360674a1140aaf32b3b4708b6fcf5b5f0610cb36043a235a117b2d01000000562db7e392bc5c78d16a1c0f3721865d000000"], 0xc8}}, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x100, r3, 0x200, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x10}}}}, [@NL80211_ATTR_REASON_CODE={0x6, 0x36, 0x400}, @NL80211_ATTR_IE={0x53, 0x2a, [@peer_mgmt={0x75, 0x6, {0x1, 0x8001, @void, @val=0x39, @void}}, @mesh_id={0x72, 0x6}, @cf={0x4, 0x6, {0x0, 0x20, 0x3, 0x200}}, @cf={0x4, 0x6, {0x7f, 0x3f, 0x82f0, 0x81}}, @prep={0x83, 0x1f, @not_ext={{}, 0x3, 0x2, @broadcast, 0x1, "", 0x0, 0x5, @device_a, 0x8}}, @dsss={0x3, 0x1, 0x80}, @sec_chan_ofs={0x3e, 0x1, 0x1}, @mesh_id={0x72, 0x6}]}, @NL80211_ATTR_IE={0x53, 0x2a, [@prep={0x83, 0x25, @ext={{}, 0x0, 0x8, @device_b, 0x200, @device_b, 0x0, 0x0, @device_b, 0x8}}, @mic={0x8c, 0x18, {0x89, "f4cee724ce98", @long="8439ec666ce5c70910bdffbfa325acde"}}, @chsw_timing={0x68, 0x4, {0x1000, 0x80}}, @gcr_ga={0xbd, 0x6, @broadcast}]}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ibss_ssid}, @NL80211_ATTR_SSID={0xa, 0x34, @default_ap_ssid}]}, 0x100}, 0x1, 0x0, 0x0, 0x88c0}, 0x80) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvfrom(r0, 0x0, 0x3, 0x0, 0x0, 0x0) recvfrom$inet6(r5, &(0x7f0000002000)=""/71, 0x47, 0x40010002, 0x0, 0x0) 07:02:07 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000440)) close(r0) 07:02:07 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = gettid() timer_create(0x8, &(0x7f0000000000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:07 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040fffffdf9000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:07 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xc0ed0000}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:07 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 07:02:07 executing program 3: set_mempolicy(0x8002, &(0x7f00000000c0)=0x3, 0x4) syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000003c0)='./file1\x00', 0xffffffff, 0x1, &(0x7f0000000080)=[{&(0x7f00000000c0)="0400050900000000666174000404090a0200027400f801", 0x17, 0xdaffffff}], 0x0, &(0x7f00000004c0)=ANY=[]) 07:02:07 executing program 5: set_mempolicy(0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000000140)="601c6d6b646f736617e43c00088020000200000004f80000200040000000fb000000000001", 0x25}, {0x0, 0x0, 0xffff}], 0x0, &(0x7f0000000180)=ANY=[]) 07:02:07 executing program 2: timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0)