, 0x0, 0xa, 0xa0, 0x80, 0xff, 0x0, r3}, 0x0, 0x2}, [@offload={0xc, 0x1c, {r4, 0x2}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x8000) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) write$P9_RATTACH(r0, &(0x7f00000000c0)={0x14, 0x69, 0x2, {0x10, 0x3, 0x5}}, 0x14) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) write$P9_RSETATTR(r1, &(0x7f0000000040)={0x7, 0x1b, 0x1}, 0x7) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) 15:05:29 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2000000400200) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, r2, 0x0, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbf9}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x211e}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x40}, 0x8090) [ 625.675157] binder: 25523:25556 ioctl 40046205 0 returned -22 15:05:29 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x2) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, 0x0, 0x0) getgid() r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) ioctl$TIOCCBRK(r2, 0x5428) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) [ 626.070828] FAT-fs (loop3): bogus number of reserved sectors 15:05:30 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) finit_module(r0, &(0x7f0000000040)='{\x00', 0x3) [ 626.134089] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:30 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/204, 0xcc}, {&(0x7f0000000140)=""/239, 0xef}], 0x2, 0x0) read(r0, 0x0, 0x0) 15:05:30 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x1, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) [ 626.305168] FAT-fs (loop3): bogus number of reserved sectors [ 626.364319] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r0, 0x28, &(0x7f00000000c0)}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000280)={0x16, 0xcb, &(0x7f0000000180)="f0aaf330d7710c0fddef87cde0f4628845d38f765a4910437ea9fccf5d733ad752413e43cad923b590f0889d4ede162fdd6e132535afa31d20c8a3bf31e92ee0a0fa690d00af8e3dabb3b8d41e6b9bafff8e88afd49849b46a870f8527182168b537a51e6bcca95a5d9a00586472439ededc96a8666a888e2cd14b282edc70b0d7fd66248c745249982c56782959ceb868d73074f3f3cf21fde1aaa8bce6cbf19fa2dfed7b08759749a975fa9ecb9e52050ebc7f274bc09181e761702506bb8a65dbc5e8c2fa00703f1215"}) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_script(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c6530202f6465762f6e756c6c0020656e6372797074656400202063707573657420747275737465642a202d23060000002d4c6f0a9b60b8f79e06787b1d5164cf5910223c9720d650a1a483c2e27acfaeb9e312cfc234b722857395d90718368f2b3787f73027170f4da9dc22f697efeef8e516c9c4ee21cd12e61f3b509f4a124d"], 0x55) [ 626.763095] binder: 25579:25585 ioctl 40046205 0 returned -22 15:05:30 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') 15:05:31 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:05:31 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) [ 627.371557] FAT-fs (loop3): bogus number of reserved sectors [ 627.432218] FAT-fs (loop3): Can't find a valid FAT filesystem [ 627.508019] kauditd_printk_skb: 501 callbacks suppressed [ 627.508027] audit: type=1400 audit(1547651131.400:26759): avc: denied { read } for pid=25589 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:05:31 executing program 5: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x90400, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)={0x21c, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x31f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7d69}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x169a}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6b7c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffff75f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcc}]}]}, @TIPC_NLA_BEARER={0xd4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'lapb0\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x49d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7a9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb5e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x41}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5c630}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x14, 0x2, @in={0x2, 0x4e22, @remote}}}}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x65e}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffffffff}]}]}, 0x21c}, 0x1, 0x0, 0x0, 0x800}, 0x80) syz_genetlink_get_family_id$ipvs(0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r2, 0x0, 0x0) 15:05:31 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) pipe2$9p(&(0x7f00000001c0), 0x4000) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00012abd7000fedbdf25020000003c00060008000100fffbffff040002000000000000000005000000000400020008000100e300000008000100480000000400020008000100e70000002c000500000001000f9b0000080001000100000008000100d700000008000200070000000800010004000000"], 0x7c}, 0x1, 0x0, 0x0, 0x800}, 0x800) write$P9_RCLUNK(r0, 0x0, 0x0) [ 627.715173] FAT-fs (loop3): bogus number of reserved sectors [ 627.734455] binder: 25609:25614 ioctl 40046205 0 returned -22 [ 627.777630] FAT-fs (loop3): Can't find a valid FAT filesystem [ 627.822962] audit: type=1400 audit(1547651131.400:26760): avc: denied { create } for pid=25589 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:05:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, 0x0, 0x0) connect$unix(r0, 0x0, 0xf5) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) lsetxattr$trusted_overlay_origin(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000180)='y\x00', 0x2, 0x2) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 628.058923] audit: type=1400 audit(1547651131.410:26761): avc: denied { write } for pid=25589 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:05:32 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xfffffffffffffff8, 0x0, &(0x7f0000000140)) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x80, 0x0) recvfrom$inet6(r0, &(0x7f0000000180)=""/133, 0x85, 0x12000, &(0x7f0000000100)={0xa, 0x4e23, 0x2, @mcast1, 0x7}, 0x1c) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 628.153599] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.158431] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.186578] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.191664] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.198263] audit: audit_lost=810 audit_rate_limit=0 audit_backlog_limit=64 [ 628.204527] audit: audit_backlog=65 > audit_backlog_limit=64 [ 628.228647] audit: audit_lost=811 audit_rate_limit=0 audit_backlog_limit=64 15:05:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000000)="9cf26247dd445a632099a91dbc54e2dacfdafd5d1abc41d8fe70341e6f4cc4a79fa6e45526cb8dfe26183964e1d8437b02d406eb08b2e5b157ab683c04b13169105adced51456f8e52232e2b14ed0ef45b3ae2313b", 0x55, 0x8004, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e22}, 0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0xc0, 0x0) recvmsg(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/97, 0x61}, {&(0x7f0000000200)=""/200, 0xc8}], 0x2, &(0x7f0000000340)=""/112, 0x70}, 0x10000) [ 628.425788] binder: 25609:25617 ioctl 40046205 0 returned -22 15:05:32 executing program 1: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x20080, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x4) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xe) [ 628.964264] FAT-fs (loop3): bogus number of reserved sectors 15:05:32 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsetxattr$security_smack_transmute(r1, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x2) r3 = dup2(r0, r1) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000000)) [ 629.047651] FAT-fs (loop3): Can't find a valid FAT filesystem [ 629.213491] FAT-fs (loop3): bogus number of reserved sectors [ 629.279532] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r2 = getpid() ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x400000000003, 0x0) 15:05:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, &(0x7f0000000380), 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x2000000000000000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_TSC(0x1a, 0x2) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) getpgid(r1) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:33 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000600)="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") read(r0, &(0x7f0000000040)=""/191, 0xbf) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x1, 0x8, 0x7, 0x4, 0x2, 0x3e, 0x0, 0x1da, 0x40, 0x345, 0x0, 0x20, 0x38, 0x1, 0x3ff, 0x80, 0x5}, [{0x3, 0xfffffffffffffffe, 0x5, 0x6, 0x2, 0x80000000, 0x3, 0x4e9c}], "f917ba93bc20494a1d65bf5c9523d769bf81d58d54b63081949a121c6f496828d1854fe0cbac9caa803726e416ad0ed1031d239968240241b99b1b5ede4ad09c977d682d635c0368dd0130395820f743", [[], [], [], []]}, 0x4c8) write$P9_RCLUNK(r0, 0x0, 0x0) 15:05:33 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x44040, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x208000, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000240)='t\x00', 0x0, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) read(r3, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1) 15:05:33 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000002a80)='/dev/ptmx\x00', 0x18340, 0x0) ioctl$VT_RELDISP(r0, 0x5605) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) accept4(r1, 0x0, &(0x7f0000002ac0), 0x80800) clock_gettime(0x0, &(0x7f00000029c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f00000028c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000100)=""/230, 0xe6}, {&(0x7f0000000080)}, {&(0x7f0000000200)=""/101, 0x65}, {&(0x7f0000000280)=""/130, 0x82}], 0x4, &(0x7f0000000380)=""/203, 0xcb}, 0x2}, {{&(0x7f0000000480)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000000500)=""/224, 0xe0}, 0x8}, {{&(0x7f0000000600)=@ax25={{0x3, @default}, [@netrom, @null, @netrom, @null, @remote, @bcast, @rose, @bcast]}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000680)=""/124, 0x7c}], 0x1, &(0x7f0000000740)=""/108, 0x6c}, 0x6b0}, {{0x0, 0x0, &(0x7f0000002800)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/31, 0x1f}, {&(0x7f0000001800)=""/4096, 0x1000}], 0x3, &(0x7f0000002840)=""/123, 0x7b}, 0x64}], 0x4, 0x40, &(0x7f0000002a00)={r2, r3+10000000}) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000002a40)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) 15:05:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ipx, &(0x7f0000000140)=0x80, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f0000000180)="240318eb227ee956d5e7433128f148913151a558f7879fa84ac4431a03372bac5079609a6e87a84e19664c3edf05a4fdcf5275dd3361805e1bd8c7f37190cc53aa7fa67e822dc148cf94cc9a2f0e5a737b5338a2f492e3ec0aa20ecc2739c54f5236", 0x62) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:05:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x4, 0x0) [ 630.333787] FAT-fs (loop3): bogus number of reserved sectors [ 630.431274] FAT-fs (loop3): Can't find a valid FAT filesystem [ 630.591518] FAT-fs (loop3): bogus number of reserved sectors [ 630.597339] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f00000003c0)=0xc) getresuid(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000600)=0x0) r6 = getegid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000640)={0x0}, &(0x7f0000000680)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000840)={0xffffffffffffffff, r1, 0x0, 0x6, &(0x7f0000000800)='msdos\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000880)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000980)=0xe8) r12 = getegid() r13 = getpgid(0xffffffffffffffff) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000009c0)={0x0, 0x0}, &(0x7f0000000a00)=0xc) r15 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a80)={0xffffffffffffffff, r1, 0x0, 0xf, &(0x7f0000000a40)='ppp0ppp1eth1*!\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000ac0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000bc0)=0xe8) stat(&(0x7f0000000c00)='./file0\x00', &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000cc0)=0x0) r20 = geteuid() lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r22 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000014c0)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f00000015c0)=0xe8) r24 = getgid() r25 = getpid() getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001700)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000001640)=0xe8) r27 = getgid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001800)=0x0) r29 = geteuid() getresgid(&(0x7f0000001840), &(0x7f0000001880), &(0x7f00000018c0)=0x0) r31 = getpgrp(0xffffffffffffffff) r32 = geteuid() fstat(r3, &(0x7f0000001d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000001e40)=[{&(0x7f0000000140)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000002c0)=[{&(0x7f00000001c0)="12c315c055a8b65bf6e23abbd6f6cccdd2cb5d85ff801e02534e7319ac45bf4276dbfde85b9d0e1fffc0b4d32567f917f177637851855f2e7001958c4b8ce1f744e94ff0707dde5e43ee76aa314ba41a1bb425e85e05504470da3d54cf53cd08fbfdd5d49e97a5e2835658b9afb1abe95b55cb1647f6ab399f043de95d1b69d03aa272db92f9387cdc86b1653a217c3b4144c79960b500d0987da34a39d53f7fe92da54b9acaea57690250a3c686e755263c423dc4c91b1475cbbe1baae7a2f7a5aa66b5c9e6d3d59fa8a78a4e591e6ec23f44511cbb949581486975c139a00fa29c3089d31a030e4f4055df50c1add763ab0a176e40a2", 0xf7}, {&(0x7f00000004c0)="a1b62a04b545dbccc38c43e0ed590dd45d8f253ae4cab8a344fc22c6cebd1681471681beb9c6ce430a6f9b6c79ca352865e5712eee5a69453b8f1907ff79ffece3d9ce3ab495e541f6e3607a98ce6cda6d0e8804267f524c7790baa0791d4675d97c78206988e7868c7001fa65093b0fe0b6cfeca432d7540ef81135b87b3325fadb7c911ee8bea24bc6c822482659891c2d98d7eb17891db5429ec7b15a024f1c8b6d52570c6679ccbec9", 0xab}, {&(0x7f00000000c0)="1e4159c541d0c52e77cf436f0f88ec", 0xf}], 0x3, &(0x7f0000000dc0)=[@rights={0x28, 0x1, 0x1, [r1, r3, r2, r0, r2]}, @rights={0x38, 0x1, 0x1, [r2, r0, r3, r1, r3, r0, r2, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x20, 0x1, 0x1, [r0, r2, r2, r3]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @cred={0x20, 0x1, 0x2, r19, r20, r21}], 0x158, 0x4}, {&(0x7f0000000f40)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000011c0)=[{&(0x7f0000000fc0)="2e8a5b508f4ca6b0b5ac5d38ce7cdb9fc944d967659737d5288b9293f67157b0b8039d96cb2ab0a98fb594c74d5e3c410d1d98744b2c262472b87713180350651dc96200c9517bb6d25452bd1f49f5ed837d6863b0d2b4dc86642f93082e12f14696b16e2c0bbc7f5eb4a7f76aeb32e1bc939bbcebe9986149655770959854a31fc1c65af70b8e5156047b16e4f6bd9395fd9e6cdff9227c786ac8c6399a6b6923f5726d419a54f84dfc64252923074dca126515bd41b0153a45b516bf319e95089d85635c870dcf9a3572f2a75c1c5768", 0xd1}, {&(0x7f00000010c0)="9e3cfb55e68d0a0e6b32e6d7cce6695a1c5a7bb45699f4e6bc30f2ff08015d22", 0x20}, {&(0x7f0000001100)="4e001e96a1ddf880a07a3dfba986d40458fa5ae0ae466f7e27bcc545fd4e1e253664764cc5e4f725726d6c16b360abacc9d262ac95b8270929c9e9b82e2b5b33eb28b50b54afa4bea1be3a10a41281db3f83c1c4e1a71e73bf1686b6b700cfa0724a244ff8fa166bb07891c591d745b5ee525ec60b696f7ea0cda3c1cd7c396ae8400bfdf7e46ba2", 0x88}], 0x3, &(0x7f0000001200)=[@rights={0x30, 0x1, 0x1, [r1, r0, r3, r3, r1, r1, r1, r3]}], 0x30, 0x800}, {&(0x7f0000001240)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000001480)=[{&(0x7f00000012c0)="c2a999ec9ad268b75c7dee9805d8ed8422e27bb676580ff344d9508652a3dbd56b776d868e28e0fb0c6ce72eeb37819b435f840a6ed02519efce", 0x3a}, {&(0x7f0000001300)="0c4c8734607c5ed11abe7ac88e1b0716815d0fb2fa1a4e95311a6cfb8c4fd5f3e2264b0d4e0642a94c7a9bf9b3247303cbb8167114bcbb2d04776a70864f70a3ac3124a96da8816e763164c79a3588f53052cd6a76d745451bf0ad3faa18e27141a74b", 0x63}, {&(0x7f0000001380)="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", 0xfc}], 0x3, &(0x7f0000001900)=[@rights={0x20, 0x1, 0x1, [r2, r3, r0, r1]}, @cred={0x20, 0x1, 0x2, r22, r23, r24}, @cred={0x20, 0x1, 0x2, r25, r26, r27}, @rights={0x28, 0x1, 0x1, [r1, r1, r2, r3, r0, r1]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @rights={0x30, 0x1, 0x1, [r3, r2, r0, r2, r1, r0, r0, r0]}], 0xf0, 0x1}, {&(0x7f0000001a00)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000001a80)="ffc868ae71be3d70ee8bb2fe32f52df57f645dea327236bf29bc430a356ef6291101bff697daf44ce614e3e5413e414a35eefdd3ee168f265399dcda4a650c7ff9ca0a18ab0b11610f39491f9cedfb2752f1d3492e49c3273fa528e47e33b9e08dc734189905afdffae0acb39a8191fe8f17aebd1cb79ad26fcdf40b5dcd1e92f3e420bccb3004100ad910010c894e56f39482ec846b6ed9886dcdf3c57cb35ea12287020c923d902cf9c3ef1b078b6e1622c1235499b62b18f907da0c852b127340043b1d1ad3bdd110eab2269e112b96fad76fc251ae89fb1e3ae5f10786e5bc92d473b35833c3bc4cf450109dd462c1", 0xf1}, {&(0x7f0000001b80)="4dd507f7492bc213108b8cd48fcf6aca9c10b0b352befd7950013912496f1d2ce5bbd0526acb69ec981d9f4166ed2578777ac7b9973058024768d5448fa203b20f9fe73151f8262e9c806b14d0578e", 0x4f}, {&(0x7f0000001c00)="5a172668b663424edfb2062c8551fe0d05583abee5eba9b797f40ccf9db6580e7873fe61acaca426a977400054a03cc0d2d4f5a14c87e8992e4b9ce6a6f331848f6c", 0x42}, {&(0x7f0000001c80)="43967fb735a2f141969c12d442ccdaa0", 0x10}, {&(0x7f0000001cc0)="9032db37812364300f1b4e4878", 0xd}], 0x5, &(0x7f0000001e00)=[@cred={0x20, 0x1, 0x2, r31, r32, r33}], 0x20, 0x4040011}], 0x4, 0x40000) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r34 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r34, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:34 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000040)) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) 15:05:34 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0xff) write$P9_RCLUNK(r0, 0x0, 0x0) 15:05:34 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x441, 0x0) 15:05:34 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) signalfd4(r0, &(0x7f00000004c0)={0x7f}, 0x8, 0x800) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) 15:05:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x80) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x3) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r2, &(0x7f0000000080)={0x10000000}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) [ 631.568437] FAT-fs (loop3): bogus number of reserved sectors 15:05:35 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RRENAME(r1, &(0x7f0000000180)={0x73, 0x15, 0x2}, 0x7) [ 631.637498] FAT-fs (loop3): Can't find a valid FAT filesystem [ 631.807404] FAT-fs (loop3): bogus number of reserved sectors [ 631.864346] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:35 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) request_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='ppp0ppp1eth\xe0+\x12\xdd3#\x97\x81M.\xa6\xe6\xb3\x7f\xc3\xd81*!\x00', r1) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x200) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) 15:05:36 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 15:05:36 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) ioctl(r0, 0x88, &(0x7f0000000040)="d91c468207e980780b0c6930a93a3dc1079899824f32f3caf381c22929f4e6f7cdf01650988c1fa99e348b352958e99655d4e8b89346baf727a86e3489f201f412044ca1a77eef2a0e7894c9609a26b426f38d6cb4f5eb13d71fe423bc9cbb4bc2dc6448a04d90c4e081c3ee2cc640559cf7c1ed4ecacb09cfc1c2d904ebe27883cde968e8f2094e78b918b8c817e3b902f82bb0aafb") stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) 15:05:36 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) signalfd4(r0, &(0x7f00000004c0)={0x7f}, 0x8, 0x800) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="8a596674f72d771b0f40741e7a6c0291aa65560be1b2af350c473ae31062517bb6625e43ed2483e771d797f9b584bac9794a2fce2c47846d4ae68c1845eea5247f25c53a34faf08e514100899592490788d0a147bea8fa070df3814ef61f9ac1ab390e8afdddbebeb3f83f27394230933e35e49213795074f4b93e8052cd6a638c7a0889a68b65c822cdc6c765e98f7b4ce249bb0f052dc3c5a38c23d3bd164635856e0620fc5e9e4bf23665a165e06e44b3857697a86892c1d8fb9c45c396ffb4e6563047b370812f660a2514d5596fb81a94ac8886e307844d9cff3eac8cce87fc4ec773386c6f291bf6f6aecd2c07d9c0018216d35edc5488c7c9", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) [ 632.521946] kauditd_printk_skb: 516 callbacks suppressed [ 632.521956] audit: type=1400 audit(1547651136.420:27255): avc: denied { map } for pid=25748 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 632.724979] audit: type=1400 audit(1547651136.420:27256): avc: denied { map } for pid=25750 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 632.905896] FAT-fs (loop3): bogus number of reserved sectors [ 632.917518] audit: type=1400 audit(1547651136.450:27257): avc: denied { map } for pid=25748 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') fcntl$setlease(r0, 0x400, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000300)={0xf, 0x8000, {0x53, 0x3, 0x2, {0x10001}, {0x0, 0x5}, @ramp={0xca, 0x6, {0x7, 0x9, 0x10001, 0x4}}}, {0x0, 0x3b0, 0x4000000000000009, {0x3, 0x802}, {0x7, 0xe5d}, @period={0x5c, 0x2, 0x6, 0x1, 0x40000000000, {0xa0, 0x7f, 0x687, 0x9}, 0x6, &(0x7f0000000240)=[0xef0, 0x7, 0x3, 0x6, 0x6f, 0x42c]}}}) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x68, r1, 0xc1c, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x112c94cb}]}]}, 0x68}}, 0x40001) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) [ 632.988240] FAT-fs (loop3): Can't find a valid FAT filesystem [ 633.180780] FAT-fs (loop3): bogus number of reserved sectors [ 633.186606] FAT-fs (loop3): Can't find a valid FAT filesystem [ 633.196979] audit: type=1400 audit(1547651136.450:27258): avc: denied { map } for pid=25750 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 633.282831] audit: audit_backlog=65 > audit_backlog_limit=64 [ 633.301101] audit: audit_backlog=65 > audit_backlog_limit=64 [ 633.306899] audit: audit_lost=820 audit_rate_limit=0 audit_backlog_limit=64 [ 633.310515] audit: audit_backlog=65 > audit_backlog_limit=64 [ 633.322997] audit: audit_backlog=65 > audit_backlog_limit=64 15:05:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0x255de7ba0fa6642a) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000140)=0x80, 0x4) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) recvfrom$unix(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) stat(0xfffffffffffffffd, &(0x7f0000000240)) open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$TIOCNXCL(r0, 0x540d) [ 633.328800] audit: audit_lost=821 audit_rate_limit=0 audit_backlog_limit=64 15:05:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x100, 0x70bd27, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x800) 15:05:37 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 15:05:37 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) ftruncate(r0, 0x10001) 15:05:37 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) signalfd4(r0, &(0x7f00000004c0)={0x7f}, 0x8, 0x800) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) [ 634.330190] FAT-fs (loop3): bogus number of reserved sectors [ 634.391670] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400202) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) [ 634.606737] FAT-fs (loop3): bogus number of reserved sectors [ 634.683507] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:38 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:39 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000000)=0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:05:39 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) write$P9_RREAD(r0, &(0x7f0000000040)={0x52, 0x75, 0x1, {0x47, "eca8855995a26db9c8ccd756675e5d7584b17d20b7879740bafb9b934ac3bec43ae2d898739a17191907badcc8b7be0b3414e120572a8d6841d7b9b860a2f2e7e455ecec47a03e"}}, 0x52) read(r0, 0x0, 0x0) 15:05:39 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) signalfd4(r0, &(0x7f00000004c0)={0x7f}, 0x8, 0x800) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) read(r0, &(0x7f0000000200)=""/191, 0xbf) 15:05:39 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) inotify_init() r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) 15:05:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000005c00)='/dev/keychord\x00', 0x210000, 0x0) recvmmsg(r0, &(0x7f0000004880)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000180)=""/248, 0xf8}, {&(0x7f0000000080)=""/82, 0x52}, {&(0x7f0000000280)}, {&(0x7f00000002c0)=""/249, 0xf9}], 0x4, &(0x7f0000000400)=""/199, 0xc7}, 0x36143068}, {{&(0x7f0000000500)=@l2, 0x80, &(0x7f0000000640)=[{&(0x7f0000000580)=""/166, 0xa6}], 0x1, &(0x7f0000000680)=""/5, 0x5}, 0x74497e8}, {{&(0x7f00000006c0)=@xdp, 0x80, &(0x7f0000000880)=[{&(0x7f0000000740)}, {&(0x7f0000000780)=""/69, 0x45}, {&(0x7f0000000800)=""/20, 0x14}, {&(0x7f0000000840)=""/41, 0x29}], 0x4, &(0x7f00000008c0)=""/156, 0x9c}, 0x7}, {{&(0x7f0000000980)=@rc, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000a00)=""/33, 0x21}, {&(0x7f0000000a40)=""/61, 0x3d}, {&(0x7f0000000a80)=""/184, 0xb8}, {&(0x7f0000000b40)=""/2, 0x2}, {&(0x7f0000000b80)=""/209, 0xd1}], 0x5, &(0x7f0000000d00)=""/83, 0x53}, 0x4}, {{&(0x7f0000000d80)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000002040)=[{&(0x7f0000000e00)=""/4096, 0x1000}, {&(0x7f0000001e00)=""/101, 0x65}, {&(0x7f0000001e80)=""/105, 0x69}, {&(0x7f0000001f00)=""/163, 0xa3}, {&(0x7f0000001fc0)=""/90, 0x5a}], 0x5, &(0x7f00000020c0)=""/63, 0x3f}, 0xffffffff}, {{&(0x7f0000002100)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002280)=[{&(0x7f0000002180)=""/222, 0xde}], 0x1, &(0x7f00000022c0)=""/66, 0x42}}, {{0x0, 0x0, &(0x7f0000004540)=[{&(0x7f0000002340)=""/47, 0x2f}, {&(0x7f0000002380)=""/55, 0x37}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/4096, 0x1000}, {&(0x7f00000043c0)=""/88, 0x58}, {&(0x7f0000004440)=""/213, 0xd5}], 0x6}, 0x3}, {{&(0x7f00000045c0)=@can, 0x80, &(0x7f0000004780)=[{&(0x7f0000004640)=""/67, 0x43}, {&(0x7f00000046c0)=""/83, 0x53}, {&(0x7f0000004740)=""/21, 0x15}], 0x3, &(0x7f00000047c0)=""/170, 0xaa}, 0x8}], 0x8, 0x40000000, &(0x7f0000004a80)) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000004ac0)={r2, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000280)=[0x80, 0x4]) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) recvfrom$unix(r0, &(0x7f0000004b00)=""/4096, 0x1000, 0x40000000, &(0x7f0000005b00)=@abs={0x0, 0x0, 0x4e24}, 0x6e) [ 635.820068] FAT-fs (loop3): bogus number of reserved sectors [ 635.825933] FAT-fs (loop3): Can't find a valid FAT filesystem [ 635.959608] FAT-fs (loop3): bogus number of reserved sectors [ 636.020402] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:40 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) write$P9_RWRITE(r0, &(0x7f0000000140)={0xb, 0x77, 0x1, 0xfffffffffffffe00}, 0xb) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:40 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) 15:05:40 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) signalfd4(r0, &(0x7f00000004c0)={0x7f}, 0x8, 0x800) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) 15:05:40 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r1, 0x0, 0x0) 15:05:40 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000080)={0x0, 0x7ff, {0x57, 0x7fff, 0x1, {0xfe49, 0x3ff}, {0x80000001, 0x8003}, @ramp={0xffffffffffffffd1, 0x1, {0x4, 0x7, 0x2, 0x1}}}, {0x51, 0x1, 0x5, {0x6, 0x3}, {0x200, 0x1}, @period={0x5d, 0x8, 0x4287207e, 0x7, 0x6, {0x400, 0x4, 0x1, 0x2}, 0x2, &(0x7f0000000040)=[0x1, 0x7f]}}}) remap_file_pages(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4, 0x1ff, 0x100000) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x648) 15:05:40 executing program 0: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x10000, 0x0) getsockname(r0, &(0x7f0000000140)=@un=@abs, &(0x7f0000000040)=0x80) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 636.970124] FAT-fs (loop3): bogus number of reserved sectors [ 636.975960] FAT-fs (loop3): Can't find a valid FAT filesystem [ 637.136824] FAT-fs (loop3): bogus number of reserved sectors 15:05:41 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'veth1_to_hsr\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 637.203209] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:41 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffeb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3782, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x3ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f00000000c0)=0xe8) setuid(r4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 637.538667] kauditd_printk_skb: 513 callbacks suppressed [ 637.538676] audit: type=1400 audit(1547651141.430:27748): avc: denied { map } for pid=25898 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 637.595747] mmap: syz-executor2 (25911) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. [ 637.700626] audit: type=1400 audit(1547651141.430:27749): avc: denied { map } for pid=25898 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:41 executing program 0: r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x500) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x10000, 0x0) perf_event_open$cgroup(&(0x7f0000000240)={0x3, 0x70, 0x2, 0x4, 0x9, 0x3, 0x0, 0xfcd, 0x40000, 0x9, 0x81, 0x7, 0x5e, 0x3ff, 0x5, 0x2, 0xab6, 0x1, 0x5, 0x800, 0x4, 0x9, 0x9, 0x8, 0xce5, 0xcd000000, 0xf8, 0x8, 0x5, 0x3, 0x5, 0x8, 0x9, 0xf9, 0xd9, 0x8, 0xffffffffffffff52, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000200), 0xc}, 0x10004, 0x0, 0x1ff, 0x8, 0x7, 0xff, 0x462c}, r0, 0xd, r1, 0x4) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x80010, 0x4, 0x3, 0x5, 0x0, 0x6, 0x80, 0x1, 0x7, 0x5, 0xffffffff, 0x8, 0xffffffff, 0x4, 0x100000000, 0x6, 0x6, 0x9, 0x1, 0x7, 0x0, 0x7fff, 0x8001, 0x4, 0x10001, 0x3, 0x1, 0x80000000, 0x8, 0x8, 0x6c, 0x800, 0xc89f, 0x9, 0x0, 0x4, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000000), 0x3}, 0x10, 0x4, 0x1, 0x5, 0x48, 0x2, 0x5}, r3, 0x0, r2, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000340)={{0x2, 0x0, 0x297d, 0x3, 0xfffffffffffff385}}) 15:05:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000000)) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x40040, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x4d88d4b2e7544a03, 0x70, 0x7, 0x400000000000000, 0x4, 0xbb46, 0x0, 0xdb, 0x10, 0xe, 0x2, 0x2, 0x8, 0x38, 0x0, 0x9, 0x2, 0x4, 0x6, 0xfffffffffffffffd, 0x8001, 0x3, 0x10001, 0x80, 0x8de0, 0x3ff, 0x3, 0x9e6, 0x375, 0x7, 0x2, 0x6f5b, 0x6, 0x4, 0x2, 0x24, 0x6, 0xffffffff, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000080)}, 0x3890, 0x1, 0x400, 0x8, 0x17, 0x4, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x126) r1 = syz_open_pts(0xffffffffffffff9c, 0x200) ioctl$TCSBRK(r1, 0x5409, 0xca2) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) [ 637.900105] audit: type=1400 audit(1547651141.470:27750): avc: denied { map } for pid=25894 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:41 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 638.073578] FAT-fs (loop3): bogus number of reserved sectors 15:05:42 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = creat(&(0x7f00000005c0)='./file0\x00', 0x80) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000740)=0x8) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r1, 0x20, 0x70bd25, 0x25dfdbfb}, 0x1c}, 0x1, 0x0, 0x0, 0x840}, 0x10) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000040)={0x3b700, 0x401, 0x6, 0x0, 0x0, [{r2, 0x0, 0x4}, {r2, 0x0, 0xfc03}, {r2, 0x0, 0x4}, {r2, 0x0, 0x8}, {r2, 0x0, 0x7}, {r2, 0x0, 0x4}]}) read(r2, 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000140)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', {0x0, 0x3, 0x9, 0x8}, 0xc, [0x20, 0x4486, 0x7, 0x6, 0x5, 0xc06, 0x7fffffff, 0x5, 0x8, 0x4, 0x1, 0xf187, 0x80000000, 0x8, 0xd98a, 0x10000000000008, 0x800, 0x8000, 0x6, 0xe9a, 0x6, 0x6, 0x0, 0x5, 0x6, 0x7, 0x5, 0x1, 0xffff, 0x3ff, 0x80000001, 0x0, 0x4a49, 0x4dc5, 0x1ff, 0x7, 0x7, 0x7e, 0x1, 0x800, 0x549, 0xf1ba, 0x3ff, 0xfffffffffffffff8, 0x100, 0x5, 0xfffffffffffffeff, 0xb8bf, 0x7f, 0x42, 0x2, 0x5, 0x3e73, 0x0, 0x5ecf, 0x2, 0x1f, 0x2, 0x1, 0x0, 0x20, 0x0, 0x3, 0xcc59], [0x6, 0xffffffff, 0x70, 0x3, 0xffff, 0xffffffffffff3736, 0x2, 0x100, 0x6a7, 0xdda, 0x4, 0x8, 0x6, 0x7, 0x10001, 0x5, 0x1, 0x5, 0x8, 0x200, 0x9, 0x500a1989, 0x0, 0x9, 0x8, 0x8, 0x6, 0x6, 0x36, 0x4, 0x2, 0x7, 0x8, 0x2, 0x7fffffff, 0x100000001, 0x4, 0x0, 0x41, 0x401, 0x1f, 0x7ae6d198, 0x5, 0x8, 0x2, 0x1, 0x9ee, 0x9, 0x401, 0x4, 0x5, 0x1f, 0x1, 0x9, 0xffffffff, 0xa2, 0x4, 0xfffffffffffffff9, 0x6, 0x100000001, 0x19, 0xd60, 0x5], [0x3ff, 0x7, 0x8, 0x4, 0x2, 0x9, 0x0, 0x401, 0x9, 0xffffffffffff71c8, 0x883, 0x3, 0x100, 0x2, 0xff, 0x1, 0x9, 0x4, 0x3f, 0x20, 0x7, 0xdf, 0x6fe, 0x4bda, 0x5, 0xfffffffffffffffa, 0x0, 0x72b1, 0x8000, 0xffff, 0x9, 0x5670, 0x7, 0x4, 0x4, 0x2, 0xffff, 0x0, 0x8565, 0x898, 0x1c000, 0x7, 0x1, 0x0, 0x4, 0xfffffffffffffff7, 0xffffffff, 0x2, 0x80000000, 0xe765, 0x812, 0x1000, 0x1, 0x2, 0x2a, 0x800, 0x5319, 0x7, 0xfffffffffffffff9, 0xaa, 0xffffffffffffff01, 0x101, 0x1, 0x8c], [0xff, 0x3, 0x5, 0x1, 0x32d, 0x2, 0xac, 0x9, 0x7f, 0x8215, 0x3, 0x9, 0xf3, 0x14b, 0x48, 0x7, 0x5, 0x100000001, 0x67, 0x400, 0x3f, 0x0, 0x2, 0x7, 0x8, 0x7ff, 0x0, 0x5, 0x8000, 0xffffffffffffffff, 0x9, 0x5, 0x6, 0x5, 0x7b53, 0xc797, 0x1, 0xfffffffffffffff7, 0x80000000, 0x8, 0xfb9, 0x0, 0x8000, 0x1, 0x9, 0x5, 0x7ff, 0x80000000, 0x1000, 0x2, 0x6d0, 0x50, 0x1f, 0x80, 0xea00, 0x1, 0x101, 0x1, 0x100, 0x1, 0x20, 0x8001, 0x10000]}, 0x45c) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000780)='tls\x00', 0x4) [ 638.120821] FAT-fs (loop3): Can't find a valid FAT filesystem [ 638.149053] audit: type=1400 audit(1547651141.490:27751): avc: denied { map } for pid=25907 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:42 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) write$P9_RCLUNK(r1, 0x0, 0xffffffffffffff03) [ 638.277207] FAT-fs (loop3): bogus number of reserved sectors [ 638.315151] FAT-fs (loop3): Can't find a valid FAT filesystem [ 638.335163] audit: type=1400 audit(1547651141.490:27752): avc: denied { map } for pid=25898 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 638.378722] audit: audit_backlog=65 > audit_backlog_limit=64 15:05:42 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f0000000240)='_sdos\x00M\xd9U5\x80\x18\x13\x03~\xe21J\xf0Hf\xd2\x88D\xb3J\xf0\xdf\xdf]{\xb2\a\x8bbc_\xb1\x0e\a#\r2?\xb4\xbb\xc9a\nA\xb3\xc0e\xda\xbe\xe5\x9bW\xb0m$\xd1\x1c\xdc\x12\x0e\x82%SRY72I\xbe\xda\xea,WQ\xb1\x82\xe7\xb7Q\x1a^QO\xe9A\x99\xbd\x91\xace\x1c\x81\x8f\xcat\xb1\xa4\xf4l\x1a[\xe6<\xd5V\x1c?\x06qQS\xd6\xc4\x15d\xd4\xbf\xfaJ\xd1\xca\x90\xafS]k\xa3\x80}\xd1)\xb2\xfcFD\xf0\x15V\xb7A\xd9a\x19\x9a\xf0$&0\xcb\xa1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1001, 0xfffffffb) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 638.443177] audit: audit_backlog=65 > audit_backlog_limit=64 [ 638.448981] audit: audit_lost=830 audit_rate_limit=0 audit_backlog_limit=64 [ 638.460066] audit: audit_lost=831 audit_rate_limit=0 audit_backlog_limit=64 [ 638.467210] audit: backlog limit exceeded 15:05:42 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10280, 0x0) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000040)={0xff, 0x5, 0x9c}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 15:05:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) [ 638.934868] EXT4-fs (sda1): resizing filesystem from 524032 to 8 blocks [ 638.969203] EXT4-fs warning (device sda1): ext4_resize_fs:1900: can't shrink FS - resize aborted 15:05:43 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) writev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 639.424967] FAT-fs (loop3): bogus number of reserved sectors 15:05:43 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) write$P9_RCLUNK(r0, 0x0, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) [ 639.493201] FAT-fs (loop3): Can't find a valid FAT filesystem [ 639.582353] EXT4-fs (sda1): resizing filesystem from 524032 to 8 blocks [ 639.589123] EXT4-fs warning (device sda1): ext4_resize_fs:1900: can't shrink FS - resize aborted 15:05:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000180)="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", 0x1000, 0xfffffffffffffff9) r2 = add_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000001180)="dcf4c59b889a5a3581eb755d1c2e6f1c926e31da31432ffcea4f1e3c7447f21950cd6d97ae69b6fbf1fb0ed4dc320aeaf852aaa2d73e79b01a569c59287a5cacc758d7ef654cc1f4f97fe6d044075920d8bec671513206474488bff44b1f7399d8dd3906fe2f8200207545bcdb071968dc37", 0x72, 0xffffffffffffffff) keyctl$unlink(0x9, r1, r2) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) 15:05:43 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 639.717047] FAT-fs (loop3): bogus number of reserved sectors 15:05:43 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r0, 0x0, 0x176) [ 639.795959] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:43 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) getresuid(&(0x7f0000000300), &(0x7f00000003c0), &(0x7f0000000600)=0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000140)='./file0\x00', 0x88, 0x3, &(0x7f0000000580)=[{&(0x7f0000000180)="9e58f5ffce80a5097200f6d365b9075e97d07cb44cebb375b1b8cd6aa31bbca63874cb5152e1e080b725d2676c1d9871d2ad2b2deefbfc39cff7d109bb7103e9b5cee58c12d7b9d374b72750cfea67d173b77b0e44779cec9b5f79e279a1a563ab6d8f8e698c87cc991c4e3f6c6c978b0e7911ce8467f01a234567b1573bb5ec1ca24c5b", 0x84, 0xffffffff00000001}, {&(0x7f0000000240)="161c2d9ab7176018d7e830562334eb8b0062b4f300c0fe1d64264cecf07d6d98128006720508ded1eeb7153f046756fc57c8a0c23bdb7cb938b0abc6cf8590919fb6de22ea2a355ff3bb319a5ee99f131dd3b3da7b3ea2779b5ee021e6de4537a4cd3642d42e538c50ed679b7cee93182c1d7815cf3a60c7262dc3a386bd64cb43729f862df006aba67f644613929c3a9be0fd1514b07b6120a49660a35482d8bd8c08d19870f336351dac", 0xab, 0x1d800000000000}, {&(0x7f00000004c0)="b0cbb4c3d3524d1f982865a5fe817d1168aa29cecc9273947a6674b56b0f772defd3605b3974b4af6292b4a8e18e9fda7fb2f35954ded0982f4c4cf407c0819d30e7c6a1292b6875e496f071b67ecf24bfb3db7f1145949dee8ab1f4a12ba2b1bf68c77a4a33f917c2f5cdb32219cdbfa59a74159370bd0d597fa795a659c55e40111bac92006c5bb8087f3f7ff1dd992ccba27a4969577ceaac122f8153d48f1ea1794fa26e6fb506de1a8f2406b04054", 0xb1, 0x2}], 0x80000, &(0x7f0000000640)={[{@uni_xlate='uni_xlate=1'}, {@nonumtail='nnonumtail=1'}], [{@measure='measure'}, {@uid_eq={'uid', 0x3d, r3}}, {@smackfshat={'smackfshat', 0x3d, '^%keyring@'}}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:44 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) 15:05:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) 15:05:44 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) writev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 640.670712] FAT-fs (loop3): bogus number of reserved sectors [ 640.709738] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:44 executing program 2: readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/12, 0xc) syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) [ 640.947227] FAT-fs (loop3): bogus number of reserved sectors [ 641.013048] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:45 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x400, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:45 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) fallocate(r0, 0x42, 0x6, 0x401) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) 15:05:45 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r0, 0x0, 0x0) r1 = gettid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x0, 0x7fff, 0x8, 0x76, 0x98}, 0x0) 15:05:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x400000, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0xcb07ed130f2331c6, &(0x7f00000001c0), &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 15:05:45 executing program 1: syz_genetlink_get_family_id$ipvs(0x0) writev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 642.083004] FAT-fs (loop3): bogus number of reserved sectors 15:05:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() r1 = creat(&(0x7f0000000000)='./file0\x00', 0x2) ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) 15:05:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000000)=0x81, 0x4) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) [ 642.139201] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:46 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000180)=0xe8) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev={0xac, 0x14, 0x14, 0xd}, @in6=@rand_addr="0b7d2e299f91cf60b285c711efbc68a0", 0x4e24, 0x7, 0x4e22, 0x0, 0xa, 0x20, 0xa0, 0x0, 0x0, r1}, {0x3, 0x10000000000, 0x8, 0x6, 0x1, 0x45, 0x9}, {0x6, 0x7, 0xb6, 0x95}, 0x9, 0x6e6bbc, 0x2, 0x1, 0x1, 0x2}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d2}, 0x2, @in=@rand_addr=0xfff, 0x3504, 0x4, 0x3, 0x81, 0x100000000, 0x8, 0xfffffffffffffff7}}, 0xe8) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r2, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r2, 0x0, 0x0) [ 642.322545] FAT-fs (loop3): bogus number of reserved sectors [ 642.379433] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:46 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) lsetxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@v2={0x3, 0x1, 0x5, 0x10000, 0x30, "d5ae79ac04fef3804b910db39ccfc265d84d81c50c85e7c3c319a249121307df57ca1f38ed1dacdff1bb6032aa7f2745"}, 0x3a, 0x1) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:46 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000040)=""/105, &(0x7f00000000c0)=0x69) read(r0, 0x0, 0x0) getsockname$packet(r0, &(0x7f0000005280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000052c0)=0x14) sendmmsg(r0, &(0x7f0000007f40)=[{{&(0x7f0000000100)=@isdn={0x22, 0x5, 0x2, 0x40, 0x10000}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000180)="b94364dceb1e84", 0x7}, {&(0x7f00000001c0)="207eeffc831fa3ae0ef7d823ca4b0a9488dd233c2095bd96be01aeb1a5ac6b1ffefca5d1d54e6cfbcb95107d7fb243a8507daa2fedea69f556f868402fef36cd404b06cc54d122201976e2a51572781acb3cd11c2375401d50e4274f82d3fd2da61a432e3cb2eb09db2bcc24a215977fba956113b27619505d74a370332e63e59e117b2a950fd69b126ce622f599b61984294647aae9238676ad9e9c07e69a363d8f4093fc4103e35fb2a8e360e99761c828a22e1cb129f6ccfa67fb7f6c30af86e7bef9b3b5ab93d6f00c51f1b06f7b80", 0xd1}, {&(0x7f00000002c0)="506f8482cf00c79ac07e57d3e26824fba98da80e54c306c842d3fc6cff2754d778ef539f7f80807d52d99d6fc2624c4275907ded92809119df115159fd945f3b1af480c671cee38ba3d6a684f7da1e41ec61a1af1189d2fa8b0017ec9647c0dbb68925ccb5008ee5bcb7a6ff7f5f2553e62bce0fa79c25297d3167fae97287ce5db7eac710f6fee4673be937221522fc1f", 0x91}, {&(0x7f0000000380)="658d809dcf539615a849134a2c4812cfba3dd427d17a5c2c1b7a8f84cb1dd1ca9d5948740629121d37106cf4c89181e31b095d5b001849ecb98d2f4f9949ddc15049eb2c3c1498fcd3e4f285eae5aa878d532aa880ec80d5ec62b01d9293460ac89e42286d1dcea1be9ec2c850194792941d71ca9c5abba8383d5681cb802bccd94e5f78235d69f93e75611cd2ff9ecb757a78551ac418eeae37d659bab3f87dbf704a324adb3422085096cd8324db35783d727def1d95eee9ffb649dca3823f8cdbb5a2444680dff05eb1c5335717108d3158a6c935ef3b6d62bbedb0f4b3948cc5fd2dfad065462dfa9b975ba06e33eb93bba9", 0xf4}, {&(0x7f0000000480)="8879", 0x2}, {&(0x7f00000004c0)="ed0066f8bfe81ac92f72d0", 0xb}, {&(0x7f0000000500)="524292dc2210f6143e26493a7295124e1ae8989943de65cabb54da1522acaac5aa7c6f341327c2059978643df753683dddc0c5eab19a5afeae73ce783214298aa953c5d9672d", 0x46}], 0x7, &(0x7f0000000600)=[{0x40, 0x101, 0x9, "37d5ee85b35a78cdbe176c3a6a4d756393ace4a37f6b0e7557d0036cb339c957d726b459ff7b40666353733fd27f85"}, {0x78, 0x100, 0x4, "5fbe93a7887f095e5dd5e3fd7e1e5dd83fb126e1175165f30ae4a9c577276cca9f7a8bbb09c74a49832fb7b225848f632e5e9916c9bc9007b96126513f537676209b196347155a5b52dc666bd494fa9b79c5a2ee62c13a34dd049332150c434f06974027a979"}, {0xd0, 0x10f, 0x80, "7868ff1dd91389ff6ec7d7c7a274bda0d6f6c74c32873ea3338b3499c80eca26612709dcd229d172bd66f9def3b0770b8015a20cd01990a83d44bac4e82e17a9cb37e0c5f00b3a78afb1c29158e316afb8af552a4b87c8df16ceccba261468c09650eb882a603f7749a5a9c388814a471b4487b4f9d24080657681fcc8e0159e6aed3a7d1f2e91e8580ad0635cd7407fac402dcc01cf1f4b48af57ec65a3287bf7bb678b7b04f343075d7150a9c6dec5bf871243c76ef88750ef71"}, {0xa0, 0x112, 0xff, "9a62cac14ccf974f2cbee906d254203d5b87e52dffa09fcc9ad38a9558d8a9312c5af0a8dce54ce9145f91b45026391af5e7d68252a3603f8d2b3bb949783f47c035030e053f26fb9bb8516751fed422f02d81ad53b37d45b80420b5e626fef7bb96bb441865f26fd8ff159c946c98c0d9c52652f2bedb21aa4871c7429da76774301771304d7f925525ac54b1b935fb"}, {0x90, 0x115, 0x401, "2ac49b7c8d19a50126c4e0f84c5ea3332b6339a312f8d9bb280b747edc5c5f6ac7ee4d5e764275938d39869640445295bd56785ae0f37b9af364cf12cfa5b9b1c169b8765494f9b27555cf85d2a362be36d17d9eab3bc9328d11cbc97684f531faf160b92a02a46bf36edd7230a7a9ebdacf83232368c11724c0c70ffeb37f"}, {0xa0, 0x0, 0x0, "87a7778c062c5867321ed7e2078e023eed26fa432429c68573cba28b2c25d9919bfa7a102bde08b6f6c310c288caefedb5338ace8929fa5267310d8fdbdc5254d3eda729f366541d83fcfc81594a97fc2618ad5f8de89ea104ff56a6cd9ede585967ff012b2742889870bbdab8904cbd1825aefa1a4ece8dac718acdbffa6702b670132069c2e97f4776f622ba31"}], 0x358}, 0x4}, {{0x0, 0x0, &(0x7f0000000cc0)=[{&(0x7f0000000980)="3c0835637485b640b406ff24f6e8dc740cd4be66ee1f7fba4e5122b4aee90f8a768246849558a32c5d84bdb2287e5d6906ebb43f3f33abc77f307ce4ed933ab2aabefbdede22856edb50994d13bd9f3ab9aeeb33faab671becf036bd87cf11972658eeb1b40cc1cbe8871d9e507d60bf5ff5da21f86cf1f9e5740c1bb4812313cebd99dbd64b9560af3ecfc021e9e84d98b6931184b476c803ffb4cae9134c2400518fa15deb95b13a85cbdafa48120024bb514bea62c17f54738c74c3c7f0e9755ca62daeb43b40d80c", 0xca}, {&(0x7f0000000a80)="ec7a53f22a38719bb47460abfcc83f8e5663fcd210af039aee935bc3574ba996d39f36dfab45adbeec7b145669ed58d86de29e666e75eede51ec91499bb2fcc7c2885d5fa8a1f63d39ab083273e220cf3e59a3b6a97b26db1f36f0ea9bd1b40ad496643b2fb7427dd0364b9d0830dec5b2fe88", 0x73}, {&(0x7f0000000b00)="4259e435d18c5f29c94390c76515e4620ed7b8deae7a4fce76a973276728070d6175703ef55473877701da65cfee9eb3cea42fa7b530b79aed430a2e2129176c2eb6f11f674eb5f9dfbe164059e54c5c44179f7d22727b084645171be23ef970bd1329206a37e1", 0x67}, {&(0x7f0000000b80)="93fe26f38374b30a1e02ba710195c98d7a7a3bd9769473f434f14927cb0092a01c2e22074c3fadbbb1f22966d35089bf3972ed1e94b6659675460f5a250cf31e960c5ac0e3d238cd8adc488f4e26d5d290250667ec3a218910414e02fd93e1be2d8b669b62efce39764e13aaf6fa3fe56564", 0x72}, {&(0x7f0000000c00)="4f6e941b92047032740d4812c7f113728334b628dc4f169896ec02d96142d6c5fd773ce5d3edbcb1299aa1ae3145ff24c52274a7156a911a4fec3c035b046e4b47d6938df893b57974c45e86e7343be76efb80f52a8c46762735611164db5134224826485c0439ed69c36ba174350cdd57ab6261b99e97cb99e673f9c9ea18e02a3a679d0e59730bc81c03e552d5912a2c6a687b440c5a6e9ff9b4842b257ee13528bfcbeaea428f9fe646ed3ad930b3978de0e52ed6", 0xb6}], 0x5, &(0x7f0000000d40)=[{0x48, 0x10a, 0x8976, "937273a8860aa4b2a53a1a0d3d4a0e0ff0f6066abb0cab50843023633b16ce5a28211de59149c2b83825834a8f95c28e7256a8af1600"}, {0xa0, 0x1ff, 0x2, "6e2c5fb856b79527eb22097c3d0138710364ab0e9902c3751e224983a0a761412cc0a20f41ed1b72bb64b8fa2956a90a0107834c98b47413a37461385f05441616afc561bbad0f4284103e962b0697994303b7299dddb70e491ab7e61428182a3209f7769f0b0976a0195d93fa0d6acc2e756a2aa2d8741fb190973346fec094dc773a5edfcf7aef02f2464b88"}, {0xf0, 0x10e, 0x1, "9e8ba2daa7709880e2e5a0d3195319c331b0da5867801ba2dc7ce3f0750f63f19ce24e7fff4d7d8cb614a5cb541d15493ce640b57773841d707dd98a8f8bc5031470b9643a77742b80f4628a0590ae901f038e4f261ead176323b69b98206bc0572c2c597493b760c2201273d6d21e4d02ef4b4e759d1dfa70984da89e4dd7eb6efbbe606919d6630e2c909a7005cf7cd5fc43a8ff9212eecd3614bde6a8762e283dfbcba507fc27e98bc92f92eae7faa3424c19c274e2560083fb7c1352be72fc7dd7a0a243075d7aa5e156caa93d0f61ebc471f706fcacbe042d0b"}, {0x60, 0x10b, 0x1f, "ab36046ddca6b029c69d979358a602c4604dadd0e0d33fcc2b16518290ebd900021c06e0f8765f89624a9a0c970433b70fa81747b238f5a54de67ad722b46bba080b9fe88564ab1c40494845af389ee4"}, {0x108, 0x10c, 0x1, "74774edec3d0e790e68c80bfdc641cef307fd935a847d2e3ca79a8e6b52a0f90c548c35a3911603cb74969a4d672511f57e40c12874b51eb477735d6a3d3b3bf7618e89c601705548ee30bf62fa8f18991a915cb9db327e5530532fa557db01f000520a6e315606c17ee54f94f306a2f664dc0465b3ac98a994033784593ae288a41c5c0cfe995f1e36eb05b356a095399e7a0e01cdf4540cf7e098d6564ab01847f0e0ef497ad5deeeac4cf1bac2868d7c4e56b7f15a1fab5380cf1293e649dd9400bf59105080876645c95418fecdc6d9b61c12616df989c600a9821143d407093b5c37e195ccf3ada213e28d801aec4869335b5ae"}, {0x98, 0x102, 0x3, "9060fad9dde27f9ca5dc0114c2fd740fb1e5766a94294c792912581bac0c5740bb7bd25980a641c7b4c86b4dc239ceed41409fa02adb55b33cb89b3adfb33963ee02a6630c5f04d80700ed4289f4b81cf0a5b6cd5f10e53475d1676d9a81f4ac06fa4b0d504212dfa8dab58f388b030dd0228f5446c4902dc48fcd8aec1abbf0c15c93"}, {0x78, 0x107, 0xc4d, "e0b117d68f3a5dede3068a31164ea80d56774f584809f9f243536c5f187a9234e080fdc7270da106867b9402a8aa7891db50a5d38f8a727b3d8a857e679fdc103908e0265ace69745b098c72e170e7ff01e859453b03052e735a3d7db7d5425f249e2c"}, {0x78, 0x0, 0x9, "e68c79753d0a2f780c7f7f065aaf294217bb03d9cd2028f4537fdfa7dfea52ace2e802caa025026806556d2a4e962ff350920c95ba8b5587695eb45d506fcc0f1d86b8de1cd4bc18c15496955dbfdca1209f8acf7aac3648559cab444cfda4888cd7c92bae9168"}, {0x68, 0x101, 0x9, "264aff9ee4dc85d380b69715f5a921839c44629a93d218e6ea8e5825cde50ef971615e6bda47a668a52f812bfee303e08356ddff2356c90072f051634172e9962745f79a97e7216524e6bd21d896599f5a6d"}, {0x88, 0x111, 0x3, "9d6ae9fcf7dae3c1429e6619ebc43c06d7cbb8f7ad328a39c349a5e629b7ff663f773cce16daf1539bd0f92557e34a6e43d8470a1c39ed60a91e3b43f94477d8b40598370139a1dd15cf14e38b95200010e7353340f96777a76133e9e484e8b0564eae422377eea60ec164292d6c4dc2eaf73a"}], 0x5b8}, 0x5}, {{&(0x7f0000001300)=@tipc=@name={0x1e, 0x2, 0x3, {{0x43, 0x3}, 0x2}}, 0x80, &(0x7f0000002380)=[{&(0x7f0000001380)="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", 0x1000}], 0x1, &(0x7f00000023c0)}, 0x100000001}, {{0x0, 0x0, &(0x7f0000002480)=[{&(0x7f0000002400)="d9e1d00c2fcbcdb635b39e030b35c232b4d1e7b42c4d77c5f2526b01e02ce74738b46eeb0073b96ed5e93aeb3b29fd8135c8e94207219e77d2501bad6dbdf54bf0baec2d73193b335e5d7718325c46022f0d5285361e34", 0x57}], 0x1, &(0x7f00000024c0)=[{0x50, 0x105, 0x100000001, "3a66d2a508462bb62f086e5e0fe5035b4a11916f3a6208518f74521ebc4a6f3d3ba197118ee75d1d539a325a12125865fb9f1bce74577e4f84e0"}, {0x50, 0x10a, 0x3, "9c7680f16c580a8c20260dcb15442ee7dbc34811c9663b84fad79fd0308a949ac5dddd7e27410025b62d80d0c194471f2e867e0ba63eab6490"}, {0x20, 0x11, 0x5, "5a6bb912e787d02a39cd44af08ee775b"}, {0xb0, 0x107, 0x8000, "98166d026b5995bd3188615ede31b2bbabce246cf3a6eb65a94017ff317016660efbc40ecc047fbdd667b270bca7b482743d116681fc559bc28663ca474aafa950ecc24119d5cff5394c17f07a174f098a3196b4061daa9236a3b1c77825176d9565b380f86d56ddc433af0033150fb9d5ef817f0e867fa40dfd34913b575358d1360fa245872f4bfd2eafd85252dd506af5c15f6fe799f466ecef53"}, {0x1010, 0x3a, 0xfffffffffffffffb, "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"}, {0x108, 0x13f, 0x2, "313b674705a5a48348a6d02c44ac804822c03f04d10cf82714e2f11063b444cd8d957db80def198c1328107561e66d496e09e8ad8c613a45f0b9e79e0f7649422b5a6eec768bbd003ba62837d3977e68b2c66330f40f0afb75848a628de56fe08cdffdc1d1ea868974604ca7344e72b5d9ed2f9e425c0a9bb03b174afd74f03181f9745b593c3a4f05a4a18e4ea7ff01985d92994d1a4ced98664a42d4365f21bf04066879abbc20946877bc9203787ca38b8c2cef1a89f823f94371b14dc99ab971435855346b610b0ce7336c99b67fc111753c95a1284a6d5db83745c692ae0666e3d3311d32b5bd29c6107967c4d74389f8ceb576a6"}], 0x1288}}, {{&(0x7f0000003780)=@ipx={0x4, 0x1b31, 0x400, "cfbae2dbcec2", 0x20}, 0x80, &(0x7f00000038c0)=[{&(0x7f0000003800)="53b12dbe0d59e53be5f67b9bbb0084767e9daaa7f550c24c61b48b2523b2840d5484c60719c23bb664daf5a4e51f9ead6ca3b1f597d3804e5efdbe6d10e6903f1bc25ffc002edc6edfa36068d9749e7597f06958f51fd72d4659157eca018948d8ce79f0d82241e97b4ae04b64b4620fb261879dceda0aa78bd77bb1b0956782b9db26d2ae4b9d196c887746edcad202612ee519bceeae5364f77f3fa717ba1c7e3c0b81a68cdb", 0xa7}], 0x1, &(0x7f0000003900)=[{0x40, 0x108, 0x8, "40abebce95bb35d1a1f36eb01f5acb0dae3bcc11b9930d85baf7324412a17a0f9ffc79b3a54a4fcde1"}, {0xe0, 0x102, 0x89, "ef1ac76411403c4e509ba38ebc0c14581620e460180b6b976b509da9c71cce3298aa22ea0320c941ca47b12204ca46878cbd141024008549769411322559da240aad276eb1b1e0ba9bb37233dd3fbff1e857833b0e9d5d17d0e8d4eab79b3b57c9f52e29031a912fb2005bc63008f855f050d1b4c31c1e412b0a15a876470eaceb5556ce7664374af752c07b0551126732a362e8f0c1adf68d6a204dfe288bdb454eb30f4e482ffd1a491d0b1ae1b946129df6ea042b5dab5ee25eefb604437722b3b09fb38d1acc940aadda4ddeb1"}, {0x58, 0x0, 0x2b, "ec1f827ce63bd43a5cc42048f370497ded645ac987b9a920de505af056530316a7e3894ab999470ec20c60e4272abd80fa99f0a374b6f2e85d38155e0ad607c2defce3"}, {0xc8, 0x111, 0x0, "c2ea597cc5d93e6844189ff6625a30cab37747302a845422fcfc45b58324898cc55d8c008cdfe89b00f6c7526ef1f06e2cd10459e762807c5af75c000e987364c02cd1b2c4a2ad6c3c7215f1fffaf6ef423982642e19d389ed333be6cc6d6fc3a095bfc8b4bd9ec70a5b0d9fe07bf228e9449f7b18c895c88cc9cb0c9907ce0f605b63301c16e4d2a9da39420c212035d96e19dca8190b49be2726b6fd5ec479cad2424f4bb7e5d6db70be7cc92e6ab51763"}, {0x110, 0x117, 0xd38e, "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"}], 0x350}, 0x6b5}, {{&(0x7f0000003c80)=@rc={0x1f, {0x9, 0xcd, 0x5729, 0x7f, 0x100000001, 0xfff}, 0xf32e}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003d00)="e2ee1cc0aedf418ecf44334e55d3d95af1a30a11ced26f1c924a68983aea6e9b8e0b93488e5e15f0feadab5f3289e43d9cc5231f8afdd50da8b611ddc0a5c9153a671db109a1e34afa61643ac493f0b93f5b5ed86dc7ccde3d02c33f4ba4cb95e80b39941f582fd866c955a842489af404933eca80920dcdcf37783cabb8db54e017562f74747f7e34529917b6b0e375166fb4667826fd0059a4e7dee0742f72624d16752fe7bc0c6558f8e308dac740ed933e64cf6263ff7debe7f09d8e76630f37da954465", 0xc6}, {&(0x7f0000003e00)="777abe91149588094f9065a5913d697de69e8acd2e73517b8fa35f", 0x1b}, {&(0x7f0000003e40)="4b8501d0b93b1b599c5a547110e99bdb392f12cda568603a0760f313303c7be0161b6d127187cb0688a153ad9889dd49f7a532e996d1f386487a8c47e15e32cbe518472f8f64c4d8cc231dd13efd9cd3cba074d7cf03f29c8aa43eeb54b8ae3bfad1026b43d98245400e46655d3f0a555bea3e095ec640d46d37e5129b85f0b5e48191518e2b6b4c9b54f63dd3", 0x8d}, {&(0x7f0000003f00)="6b3a480e7932b75da56e033fec469de470db954f3a7d7539a82a825eeab3da47b625ee1d9317cb7b89e0067f421df75929bcd61190c584e4c447d36457d7558c9b0890d5673f949943dfc2b17641d27d2330896c1b77cf71917489282a8b36d3cf9232", 0x63}], 0x4, &(0x7f0000003fc0)=[{0x18, 0x113, 0x4ff9, "df"}, {0xd0, 0x12f, 0x3, "71b64608d30fcd7ac5cd24d87cfad68c9ebb81414842813ea70e6b0b9afef6c3d1114a6a6848cafa0b6818c2e4c970ebf6b4e84f745ae24b20cdca4ca09a577252a16634042e765104f0fa4bf901f2777f6a341effc19468771d7d087155ffd6caf33e7f648b48282f2a06143d8198259f1e8d5f329f9ac51142f7e06ef40d482ee92a8c799a07dba6e73ecc329fb96118e6a8400217f5fa6b9122c9e91bab8d27ed7210e0468a73104833678b972442178929e2270884bbe4"}, {0x70, 0x117, 0x9, "349119ccd0806783b0062df2645d3918afd9889dd61d8c31094f9f4c5aa8c617d3522451a9cab99d9f0bb407212c4956fb9de0427e2985d1ec703817b534e0bf25683598162266dfda648c171269994ee29b4fba0d0432f43adff95478"}, {0x1010, 0x1ff, 0x6, "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"}, {0xe0, 0x10b, 0x44278481, "d2bd3644f89c9df95c7a2ce7d77842d24399c7b80b1689e2670ae3f27c2864faf252f17dfe29b26dc6fa3970cbe9140ba3a936ca5d1b4f985ccf4391d0adc85c7da0db296dec939ce8f9680d20a95e7bfd6b09a9078be56c453ed4cbe96edde0e6621fe4ce9ed29bc7d4f6f92f3f8ceb11ed3eddb7ef8c340140fb2d51563ef7099a9f8e3727fedad3813aacb26c562f2926a9488f7a5e97aa135b054a983b8a39f19b6e75726c8b9589ac416d9be973a4db8e23fcb503954adaf79519f1775e4f7707b7e5c826c7df043b2ed234"}, {0x40, 0x0, 0x0, "5d6302a092541142c74c93d330e9f45af9f190cb5af8d4066c683cdb433988380c709af8689a4f89efd7e1012d"}], 0x1288}, 0x6}, {{&(0x7f0000005300)=@can={0x1d, r1}, 0x80, &(0x7f00000056c0)=[{&(0x7f0000005380)="ee5d8dd228795fc165e2c62498823ca45de4bc3bc5fb5a1e6c2bd9004c3030d4ab73e79bc9a4418e59a265c698818a6a24bf18d607c5c986f61263ae43e98c0b57d405cf98929845a7ea2f7848bac9371b7d7d7a986a6a064e00282a74fe84c47dc909d14066908041d9c079d2403fbe85975dd9b06ee12532cb09a561fd7c5dbc00c354e5c7a288dc51cceea8ce7cca3cd4b9a497e783a7799f520d83b14e1d15ae85b3b235f51e09e387445eae6e2a3a0c352e6b33a2a1aeaefc7c86aaac4df9b091cf0563cb63f06680938b8b97610f828c8defd81337009a334ecd1023", 0xdf}, {&(0x7f0000005480)="da7e80962c71a0064177d7d284b90df991fe7356323a1bd0aadcc91d583ea729859287ecb0feacc16c4fe78cdb044a972f9996476a0e939762569bbaea71c266d8b71530edfddd6565fce03ea0ecf5e096e0318188c9a67137688a52505c285a041072a5bf260022f93a2785bcd0a51f8c11e52274004f8bddaba1acb4bb8a0cfb7ba34ad830008870f413890a286eb49366ec8ffeed4f846b90279b9cbc5e61c1cbc6440bc91e9ad8294fc0787ac9c5aacbdfcb33e7c7b01cb65c85af622d5bb8884269824b7b6f98824d109d600b548c3ca33e6af65f", 0xd7}, {&(0x7f0000005580)="9a9da678c5d99b6d566a0e7523e95bafe9ddd9d574a2f8204964fb76764c6bcb2bc715d152abf002ff5b64a8c0acdca0e9b784c71b83fbd633842c774b979b5b684e31d33115b076c69a1e123e57fe7d10f77cafcdc38cb81443190e62ae61ffa4f8cfa250dd6a60838aa163002362bd4e70c157dafe421bf09e68f96d785ecd962fc790c3d6e1c3eba79124a2b147dee627a54217cc3b950386889bd26e8cc17a1c65aa2d32f1b58a44e3dae215b0762edd5112a04748c077fe69445bda88bd25445eb59c564f5d0a2d1e578fb54b0411b106c17c7737c890", 0xd9}, {&(0x7f0000005680)="dc", 0x1}], 0x4, &(0x7f0000005700)=[{0x1010, 0x11c, 0x100, "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"}, {0x48, 0x112, 0x2, "9cbe6ab0ce1d0ffd6cae9d700286d3ce94e78f21af38dcaf5137d8b4f3ed9df162502c9e961bcc945ce1299718948535ed1e7fcc82"}, {0x1010, 0x18c, 0x8000, "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"}, {0x58, 0x187, 0x9eee, "0bc39e5550cd5659ad82714295f810a28423caf618e6a5b2c3856d1223158216a9ae58154b8fb1d0f1d1f46be17dcee80c1751de71884a258c509191da902dd78eba"}, {0xa0, 0x0, 0x7fff, "7a549fce38ce6eed5fd589ac1f873d1069faa07b2a9cea5d961f22e33978379eeb1cd45a40e64cd24b1e7b1b039bd2e06813005d80e3671f99c5523578b23dc8b144c742a949cb74851f7413ec15991e92477b7cc5903cc5f83927d3686b9ab42c0174c072bc825cba72af21ad6da809d084eab6528fdb678780d2d6e2f32b2b6aec6a59363a06e4f23a4ab118"}], 0x2160}, 0xfffffffffffffffc}, {{&(0x7f0000007880)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x0, 0x4, 0x2, 0x3, {0xa, 0x4e23, 0x3ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}}}, 0x80, &(0x7f0000007980)=[{&(0x7f0000007900)="1a5ce0579b1597a64910b327ea6704794ffb867a99bf6c918b197aa420c1aea61f1b42789c844595dbd527d363bd679475869fca31a2bc79e49beb5ecc8dc695ee4bc956b9cc12b6", 0x48}], 0x1}, 0x401}, {{&(0x7f00000079c0)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @multicast1}, 0x0, 0x0, 0x1, 0x1}}, 0x80, &(0x7f0000007b00)=[{&(0x7f0000007a40)="bd1645b94de918595b744b2df6c1b80f71f70d95e270e9385e5abe107c4181914ae35cf99ed983da3d6a9934e3cca986bb5438f456da1e979df79a26b376da350a60876cdc8445cd3a7fbd3ddbf62ecc71509fbf7dc57c198e1bc3f08597b03b092b4bdaad383f19b53b13ed6dc13952d7d0bb96827e8f66af614f8201d245c0c25833bd16a7c4b609a1a13792c30e5e730cea308a0a52ea35d6f046265ec0ad96f283561f8320f903300e4ca32d9d4bdc4cba3f69d72f9e06e044c7", 0xbc}], 0x1, &(0x7f0000007b40)=[{0x38, 0x112, 0x1312d28, "670c2df4c59e68191215bf6ea071c57967feabbb735fca70726f59ca046a89b612f916bb879d"}, {0x30, 0x6, 0x1, "d17819f42701d254042ed1850576b0eaff0db33612b614f11b"}, {0x110, 0x1, 0x0, "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"}, {0x28, 0x10d, 0x5, "6f138f91e4dcdc7d3f30afcd3ef313fe93bf814d24ff48"}, {0x90, 0x3a, 0x2, "0f25259c76e398b4326895d1b6ff6c730cc121d4c42171b92c0975b22e7eab2e9e87ea92e20001456b4dae8c6e47619dd0d8bed9d9827c48c4043de5d043f8066d5ccd01446224975b4f114c07a9f6ee8855e79c3f2908d1b31b9f10381ee9286581c7497ec59767f0a4b95330e384579a384aebbc51e3dfad60bd05"}, {0x38, 0x11f, 0xffffffffffff05aa, "b68e6b542de0b22db5b75fddaba5d635e9f10ac477fe0f663f3d43cf4c54e6acf68de134ed3d7f06"}, {0xb0, 0x110, 0x61, "d0cd03f624236d262c1653759f97ba54c8665e192e2b29d5ac673835caa324511ec93d9139e2e613179cb67595dde87b8e3d9f503b48afa31f2708f87d8749d17b63df86e6aabbc90c4de2b717c7863ff7158fd8bfb504bd9900878471e9bdac20e17858836f40fb900a3337db2c97d36891ac786eddf50d2ce6b516df197223b452f900e3007b3ec20a266854ec22944ca0ce51f3ecf1c44a8e"}], 0x318}, 0xffff}, {{&(0x7f0000007e80)=@ipx={0x4, 0x3, 0x2, "b8d9cb235033", 0x101}, 0x80, &(0x7f0000007f00)}, 0x1}], 0xa, 0x40000) [ 642.553708] kauditd_printk_skb: 457 callbacks suppressed [ 642.553716] audit: type=1400 audit(1547651146.450:28209): avc: denied { map } for pid=26057 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 642.710522] audit: type=1400 audit(1547651146.450:28210): avc: denied { map } for pid=26054 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 642.877924] audit: type=1400 audit(1547651146.450:28211): avc: denied { map } for pid=26054 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:46 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x4e24, @remote}, {0x307, @broadcast}, 0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}, 'veth0_to_bond\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x1e, &(0x7f0000000240)=""/6, &(0x7f0000000200)=0x6) 15:05:47 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000000)=[{r0, 0x2001}, {r2, 0x100}, {r1, 0x2000}, {r2, 0x40}, {r1, 0x81}, {r0, 0x100}], 0x6, 0x6) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x2a2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x6) [ 643.074550] audit: type=1400 audit(1547651146.450:28212): avc: denied { map } for pid=26054 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 643.162574] audit: audit_backlog=65 > audit_backlog_limit=64 [ 643.179310] audit: audit_backlog=66 > audit_backlog_limit=64 [ 643.193864] audit: audit_backlog=66 > audit_backlog_limit=64 [ 643.194755] audit: audit_backlog=66 > audit_backlog_limit=64 [ 643.219115] audit: audit_lost=832 audit_rate_limit=0 audit_backlog_limit=64 [ 643.220591] audit: audit_backlog=66 > audit_backlog_limit=64 15:05:47 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 643.309074] FAT-fs (loop3): bogus number of reserved sectors [ 643.354899] FAT-fs (loop3): Can't find a valid FAT filesystem [ 643.532600] FAT-fs (loop3): bogus number of reserved sectors [ 643.578592] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:47 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x5a) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:47 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x0, 0x0) read(r0, 0x0, 0xfffffffffffffe6e) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x7863, 0xffffffffffffc4e4, 0x2, 0x0, 0x0, [{r0, 0x0, 0x2}, {r0}]}) 15:05:47 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) 15:05:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400, 0x0) r2 = accept(r0, &(0x7f0000000180)=@sco, &(0x7f0000000100)=0x80) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2020220}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x58, r3, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x4}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000080)) ioctl$sock_SIOCBRADDBR(r4, 0x89a0, &(0x7f00000000c0)='ip6tnl0\x00') 15:05:47 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40000, 0x241608cf6f72810e) setitimer(0x3, &(0x7f00000001c0)={{}, {0x77359400}}, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)={{r1, r2/1000+10000}}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000240)={0x9, 0x7, 0x10000, 0x1, 0x6, 0x6}) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x90032, r0, 0x61) ioctl$TCFLSH(r0, 0x540b, 0x2) 15:05:48 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 644.548243] FAT-fs (loop3): bogus number of reserved sectors [ 644.612424] FAT-fs (loop3): Can't find a valid FAT filesystem [ 644.787768] FAT-fs (loop3): bogus number of reserved sectors 15:05:48 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000000540)=[{&(0x7f0000000180)="eb00a942ebb9b7a3407861d2f575296ae7e5762ee5911da35fea54510a90063e5fff2035ab2d666d771a9f9a9ad351e844902961dbebeb6b400ac9d6b2043b7ff353df922419852da182698efe3882bb1a26c1965e1ab4914fef868ae263f76699aa9cd95ba3cd563c1e29b388de1652d53b932f07324e63a7d6b4684a0a2e0b2e119bdbcda18b2d793b026ca289d8ceab98b82cc16f0884ba7bf442ee9da0e73762490ebc3042e8c902d5fb0e4428e3332f2dab13faf01b5a71ad3911625312334af3fa6c48e18c6fb7781b2973d669ae9906", 0xd3}, {&(0x7f0000000280)="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", 0xff}, {&(0x7f0000000380)="ebbf182664f9d9", 0x7}, {&(0x7f00000003c0)}, {&(0x7f0000000400)="eaa9c59f8f3f38a3c8323c523feb66c6633d8928cab9f2bb5c29dad61dba6ef8b71e196aaf558be53043d1c8e23865679483e94b2ab3bf5f392ba0b2efaf0cc10c1caf65664817a829ab4ee6e1eda6a0cbcc1dbf95", 0x55}, {&(0x7f0000000480)="0a5cd54c4858d38d1f982307d668a023f3cd7723772a746f495115fbd5158cb61cdaa28ab4d3946ec3727aa34b7c8f84f7c89359df482827e993d0ca2d264f9ceb09828139b6d498e7db5080fba8fe750eda3b84417314b278cd243cd021888a97fe3fa07fede4908272cf58b09cdb8b367ea517a8e38800b686e586c66de71fb348f7eba61630885994b39679e4f601f86811364ffc36768ec1a1ce6d8fc56b0c3b40ddb12d50f513f5ea", 0xab}], 0x6, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000003c0)='trusted.overlay.upper\x00', &(0x7f00000005c0)={0x0, 0xfb, 0xfe, 0x6, 0x0, "fdc5c737e33f5c0a04c8ce68e9d3788b", "66ee3842771bbbdca5ae4821f2a0c445dd3236a2da39b922930b7a8b0f2485ec7fc71d8e061b6a0921fbf20f9024adc7d28e846d0841a12b66ce4ba313c18634712f5c9cc5772c8f407526c06aead2353422b5b76c661d3ddb37d0a23e1fdd56148f2159605034c0e28f98bb767a1ac9a74bb92de0086b017dc48abb7835e79bb50f6e1a6cccbbe00da8e8f8e90b0fc7c39040210ad04835f9b3caad5c7af1bf6a3936a9e7bf5a3eaf7771965fbacad252b1413561781411989f61c0f0c2fa1ba1e8f8ed80236f1688985ac0c8eda5f2eb44b759dc9b9d282a9523e93bf91f40df7d3b2eaed2f1d90b"}, 0xfe, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x80, 0x0) ioctl$VT_GETMODE(r2, 0x5601, &(0x7f0000000140)) fcntl$setown(r0, 0x8, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) [ 644.835126] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:48 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) 15:05:48 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) ioctl$PPPIOCDISCONN(r0, 0x7439) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:49 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) write$P9_RCLUNK(r0, 0x0, 0x0) 15:05:49 executing program 5: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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", @ANYRES16=r0, @ANYBLOB="000325bd7000fddbdf250f000000080006000008000008000400750000000c00000008000502000000000c000100080004004e2000003c000100080004004e2300000c000700010000001800000014000300ffffffff0000000000000000000000000800020600000000080004004e2100003000030008000100000000000800040001000000080003000400000014000600ff0200000000000000000000000000010800050002000000f6557701dfff0414fbd4aa671428a42b65d96d29ebabe1717c164efe67624e04d6c06e5fcd5ad87686cb10b6"], 0xb8}, 0x1, 0x0, 0x0, 0x44045}, 0x8000) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='loginuid\x00') futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{}, {0x0, 0x2710}}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) read(r3, 0x0, 0x0) 15:05:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) 15:05:49 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 645.749489] FAT-fs (loop3): bogus number of reserved sectors [ 645.804410] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:49 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 645.961900] FAT-fs (loop3): bogus number of reserved sectors [ 646.014339] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:50 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x40000, 0x0) sendmsg$key(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x2, 0x8, 0xd8, 0x7, 0x8, 0x0, 0x70bd28, 0x25dfdbfe, [@sadb_lifetime={0x4, 0x7, 0x8000, 0x3, 0x0, 0x80000001}, @sadb_x_sa2={0x2, 0x13, 0x39, 0x0, 0x0, 0x70bd2c}]}, 0x40}}, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000002c0)={'ip6gretap0\x00', @local}) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000180)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000de1f00ffffffffff00000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xc8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000500)) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r2, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e21, @multicast2}, 0x3, 0x3, 0x2, 0x4}}, 0x80) symlinkat(&(0x7f0000000300)='./file0\x00', r3, &(0x7f00000003c0)='./file0\x00') ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000280)=[0x0, 0x100000000]) bind$unix(r5, 0x0, 0x0) connect$unix(r4, 0x0, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000600)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$P9_RRENAME(r2, &(0x7f00000005c0)={0x7, 0x15, 0x1}, 0x7) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000004c0)) 15:05:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@broadcast, @in6=@initdev}}, {{@in6}, 0x0, @in=@initdev}}, 0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) writev(0xffffffffffffffff, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c560a", 0x11}], 0x1) close(r3) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r4}, {r4, 0x4410}, {r5, 0x10}, {r6, 0x2000}, {r4}, {r5, 0x2000}, {r5}, {r5, 0x1400}, {r5, 0x1002}, {r5, 0x50}], 0xa, &(0x7f0000000080), &(0x7f00000000c0)={0x8}, 0x8) 15:05:50 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) 15:05:50 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) pipe2(&(0x7f0000000040), 0x84800) 15:05:50 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001240)=0x0) getresuid(&(0x7f0000001280)=0x0, &(0x7f00000012c0), &(0x7f0000001300)) stat(&(0x7f0000001340)='./file0\x00', &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000001480)=[{&(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001200)=[{&(0x7f0000000140)="c797ff0557c99e10656c1f500db2b8ebaad60c65ddb7eed8777eb53f2b9e64be8f48f95ae04606d1cf84387c385bdd9f832fb75f4425fb0f231ded650ec3161119a1732d65a8b092f7d5f90f0b959e91946d4e556a5b1629ffe8538008a467f5ff3e3a6f40423edb60ad5cb57a0bbd4874b2a88f7a28603f8e9c5daec34f9e87bfa8dde63de4f7305056fafdf3be219b7ddf6ae3acbfa3dda3bc264450a8f781446202ca02c7088365980b42608ce11a6f3dbac4b79a2fe9aa7f7bb240ec6af991b0c23371c29683c801667efc980e2e7d8343f6f95b8881b9ac07f341ec96facb15fce04657b679dac2f10a7a75b42c6e40582b6f60bda408337ac117161df122a14683154b2470be96ed04b1f92fcbe4d3d23fe308f7ee0578610a93fade739ae89e912dd1c16367d5ed1980bf6f9294d2f863f97c93ae67d8d03e083521a4d6666e146948eeca780df165f025ad7dff52e4ea49208455413ff7ecb0d0db7bc3cb10288e237da934797363a48d90e7bd1dcc418bab4b60d653bdecd928d390d6f91fb0d01b53c60ed940716f49830fb71b45a35d6a7337a6761664e7c6f355be3396d74ac9fc7e14745f65642eff0c1065bb621a3687ea12fd5481bd7b568865286a9acc239badae353bf4e828882009ffca2fff2da3a32bb0f9508a0c5fd1bebda54dc6429182358359646d33ab013302bfe3a0a19566f14c5950c5454706deb076b9a4847156446af46b831231bed91a8ec6a68461ad081956b5f156ec1b109b2dafdb8031218429619d04b23bbef0d5164d641eaacdce8cc99c60c50ffca2c756b20a6cfd6d9475596c770356ca8249456a3ca290f6f5dbef7d05f69e7414fe573bb3e730e9c26190049e69bb8552cf31eedf7cfcf527eab89f01084b202fb678ad87917c1be40fcff548b6c856bf8e5963d6cc2b77e4fb3f4e34865b9cb12a49aa4b0dfd6a0d9f8622f9855788c30c88013260f2fb6668f56709cc23fe4a4ad5fca45912e8976fb2cf8d7bc3cb3a0db7e5c32c622a490be3ff4386b047c9e6e60813f65df3fa25aeed0eaba8ddb129a1510c6a1f353e5bc8aa0c65b4ef6336cdc1aba824fafffc8fbadda75fb64499742e53d36d1cd6bf1d3557ee0cc36f9c4d00883d082aae6f98534e0084699e5392260b6302eacd8b1ca3899aad07d3ecb65da41b97858fc097431115f27e3dfaf2c512c81106a10f37718294f4786bc9cd5ab661134f8ce3dfa07635c28348e73e3a44aad63662246b23ff7ddc566ef0615ebfa0e063ca1503385f719be0f2271a712a1b40e3f3b44ed72b695b9fbd2ea2c2acc496a384d5612f74e1045aef951492cbd0633faa048b36f3d4011b53d4341724b00a2775dacb9af59ab3e01c168b60a7f0b9e83b545c8cf7600b9ac55abe880117f37003897c5349c69568630e894373872e0369108a96b3020167104800eb1a09e934a99ec02dd80b71c5551f98e7f8339337f8537d4c35342fc4dfae344152ef801b5112b4055de00f15c339cb4d2d2be133dba7bf2260aed2422744a159699ce5386e27f08ad6359ce10a93d057fe3a8188d1e9105c88591cd12fb4b49649841f5571957aba83b452ce92fa9073de180e1c68e399d1f66251d21e759719bb75cc5a60c4c170d63b3bcc2b853ec57c6a6dafef93b163fe6f6d3da749da25dd2789d4594d21c5db8133dee80299df653dba8c7e735267261356195946d1c87afcba25a03b092a9faf5a53ea84c2149421a531112d7acda241bae39794c313f2230c9df70a4aa442c0b7ca281ebe94542c8ed76c43d8b1daa4634793acb8d45170f23ba3ef33841c0b8ac5739949324b0d05509c9f05caf9fb0abb0f2a1b3d410a1b2aa6aa220ac7f8ff6ad19694f76db419ca263411f78c0e27d8fba941df448b1fdb598995cece088b836bc895aec388d1249437d1fdef8b250017d7557bff2235808560a3ee03e710606aa4e2076ab7a0f5158fcad2a99078c16ae0fb18b1e643bd8b0037e7d27bcbf026b19ca27dbe609ae67d674b0b83420fb9e1e2e3e014effd6f87d7c379f1edab389a0feceeef2e2be490bea459cffa9fa7b55c4f40788c476f5e14c89ce8969e009881157350331c490c5e08a77b05c9444ce382b574846f471466d93e3e21ad0bb205ed2f3207005245e2750d9d5f74f9cbe06a58eacf12adcd724c93defe52dca83e84a4b5af9c402e2626591d26de99a8b06ee256347a2a6839fb65acdc27d29b8bc32efaf3567f02361a6bd392c5c4901e950e61251d53a3885bbe21768ae684edb467738e89ece42048d1cf6f9ccc6bb4b0b8acbd7bc25464aa0861507a20b0bf4eaf935a2dd402acd82333abef0f9ee534f6ead2f108c99428b2b8a53bfb362e2944921a1e654b239796a4bdf334c70a053e62f6cec1d6083e81a7654da28a38e01d629cc0e680e35f1d95c31d5fec3159700e45a0c05f4b4259ab9d8d9a37293a684f94f42b082f0a2bedbbb51397b13d8a40aa93e10b7c3544e348314e82115fec22247403f8786548ab7cc9f6e5d7e315b807604d730abdf7407c477692ab46a713764e86ff34995fe9f75799ad70b8805edb50d84958c5d5b47111635cbd448f888746a8a535db3c209073bb96af7de63a98eb61c9a779da229dbbe3832472c19d3891602c5562ff226909379f593e2559ae31791f683c535b95e336159e00bebdfd5a1ac81f5da6131c5fa53cee0059cabd01d8f60d74d1229e7d85a39653e90fb4f92619c12037da90a1e43c1573b4646e74a8fa19f19f222829bbca75ce8e10878a0693d3f7c9a7a87c24f706380352e221208a6fe7472df52dc141f49b1010035a2f8b32f4d2d16d086e9550da21ab0d20f562f00186f7dde166af3a2ffbeada9110495787b986f202123066f274dc2094fbdabcf1573657b46306d1c6d244e3ebf10b18638df1e023fdd3e2ecbe345be6ac9ac8d181f587f8ef1bc2e409b37b255c36510041db7db55d46de72b914f8cf5a0f7f731a5ecd9b25c184deb0ee3aeb30443fb4173a979787c4ed7d5d91afe55fd378e840fe7545b27623fdf4d5f6ee609f45c25a7a3a2e8ce6848156f23828c253c4840a823aeffb31ff1cfb4c213d030f11784763e8630da438a5b40f2c089dae748042ad657726d1f17de642ed5a58c842eac00fbff4956f7b2d7b4b8b4adf6b3edc591a22c82ce346b5cb5e7fb724cd62921bf31c04cca676ea86e2020b24c4b4e4ad780c683e9cbe956d3bc9726b18f987a644ea12a871b47892f1b99c681888d82f1ed3958c4b118355109c0614df3ad9861a53b6a1955f42d418e4a44b3d4d710f2b7f7a5b260e4a3b532886efdba5f3be3cab9a90a1584d24b4475d30d86c96e3890ccb386fa6cb95dd88fbc8d374c81f9627c480fda49996b74f885f3b0236f593810e29320a9590d4df35e5936cd8d138560ff3222ea45ccf25ce38b9641b76cb8b9e8b492b1309de38e1cdf82f00a49af6f585aaaee65793378307ab88ec9be51ecbe63217f942eca18c35f21174a2acb79c167f1016d795746679c104964656f2f50a336f39eb78a5a512fec9e4ef757ac7041be49f7f895f57ae314233b5b971a2a763f960fa3bdc2825e6e5ebbf3d19f1a5541072f9dbb0726d850998a9ce6da5dc1e3f4289197cc02f3b10517fd79bf88d938415d53832bd9183c681067c4715f895316f52d87213307d311f427d33ed0fab012ff649731ee8e0dd2bea9c1e114acad15438fe4558a68760251cd68c1ffb9e621aa8b57184d684c5ccfe774a8bca52c477dd7aa24093779f8f28d6b77ee10b1ec9c9ebba8bcfad64edce5930462ab6073858d7f481058abaa6f7f380e9e46abce42701ad93f04c6c495f72361bb609895ed4927e68c74660a026327ca590d4af748af2d20060adda527218f169123a7d05ebcd84d505bf845e1081847fdb8eb4c52c24a068f9d683d4672a6475f80337dfeca1c76367bfa98a979d1c7e46e008ae70274479d79a67279924b53fc396d1f6b5e636093ab070caa868c30215574cbb8e14635b2b6d18696ca19fc8dcd348507355ef578bf315e174238114bb6f80b75254e497d7e461df974fe6718ace416e6bc0bbdf36e167846fd5afc783fe436346f29aad712e609044f06b196a0d21b72b45bc8663115e4ce6522deb202994988fc21eed7ee0e8afbaa75012a5ef565a1df272a96775a1232a79f3c0e783032bec9f34245a71209d3003bfb9588b3551c2b0fd756765148cdf8736b7195ba31f16231adea4c97d5633a841a6d89b6940486a27b793cc85ac8ac827e58c41dfd9d4109cbc8f6adbfa299c1f10c806a1bea365056e6128d7286e5d20ea20a7ea8f732324ce0eefac4570b66902b15dda4b9a11b4796ce80f09d351c0cbbfd4ada88c2a4dafca3e46b6209a5dcd368590373334ba765af45208dfe669a4e3c072c8dad2ad9d88ce27ca9ae5c52877b5cf7bf32e7d097dbcd0201db1408bc59a413a4a1b322864407a1053dd7b8be5c341cc7dc2b2cae98280df67dfe9f9acef23f7ef5e024d09299265c82d6726815298e77102d54f6bb0002b2ced9560bea61f4da391105a8945a08cc0498a3d8bb9d73c2a32f8dbacba973c74bc23ba57baa6dd063434d3f92c3113032a120109ddd3819ab964ad554358a52cea2723b2f665332c03f5f765f7ba5305bb0e529c947937b1c891a2464910d2eeaa85047a84ebc9bf51f9f6bacd71369aa579d7f3a906be21f28ceb146e90d278ed5cf9d660d2653d6d121427473a8122c5bbd3063cd998761000526f4e9d5738a519385bea4bbd5cd49cb34ddec9b932445b62a81b9f5e69a135145d3259bf67b7640b0980633fa237a854a4e4e46945d2f004229790f72180256cd9d40b227816df90e3327ecfe1e11ede3801ecec8107a7c5ccf43f964ddeb68e411f0b0788494223950109ea3b5599ad34cc8f987a125f1f2eff158a0d5f70473bf1c910616f100e3cce1c1e2ec5df690a0c4adb2ddfd58dc87972d222c2ba97e5587817653116332b9e766243b9a7e28e3ef2134d7cfdcc13085182269eac5d6c061be4cdf97cf6d59fbf66d7e6edec1366e740d6ad63dd90afd5ad7abcc6605bce5a51bed15c923296c91ce23cd030b592c4c37bb993349440a11bcf6524a5e0adf3c54a49ab4715e515ada912cd8fbd4b49c7f357b5e23ffda8ee226142fddb24063716522e7c0992aa13828e6f44040978c975d0b91669e3cbfe5156b1143cb3eeb8ba069eb0d8cf3f1d216f30f0ab1f8b2cbcd6e416167369b2039b5778d38a09cbd2eaac8a853fbc1969fb7c3e5d69eaa6ed4d72b9d8657cfd19b95f176a04edac49bb9e24b96f3a5fa63f88d588b5011cedddfaf5d17d9b9ae0e08fc9eb8aecb2ba17d8817deb7162302510c4c177bd4145cd579785c485e765190812928f691f01e2dcbb733255f41437f836a20d93db2e573707afaddcea98cfc19aa6aba35bfdf968bb98368ddce2ae90c08c8de25d7bd0d3656f051764d547ea25740d38f0aea2dc452bfa74cd1ec55c899d9a00f980589b47dc8e1dc7763bb413d8ce1e3771795c2f662ac768401b57fdcb4d5ba1dd8f2922260f50cc050f7984b394dbf0b6d1ca90773b48096b636bd85b7735117e75d9a4ecb168b62d22c19f3e4877c4d1d60e40016130c586a04ea4579c443b102e4c54a5259e26ba9f10d971b628525d52587b3a3ca51f34c10d04fc4f6e337f3abfc0bc4a665cdfcbac61aa93d87a33cd6dde274f4d7c7bffbfc8cad7776eba62dca575bc82bf41e6b451e4cd7f458b87f0ec", 0x1000}, {&(0x7f0000001140)="c13cffc73cde2227e33160010bbb88bd6354857e34286b1df54a3e6573d6cccb0ab07838cba6f186d13bd28730350b08b09f9d46751805a5478e9204fe04e5685b1d7c2a79636621856dac6fef4e7c7c9a6ccb22c990b87fcef3fc4f71e79cf4f4ad6327c87abf0ef5e4d556ecdf3cd84125067bb3cc259e197339215cb9f02b3309d5402e16775856a94a055fd11856176e90094b854f3c7f5a2abdee8a025f11c8fab17feb88106b1c87b94e3d", 0xae}], 0x2, &(0x7f0000001500)=ANY=[@ANYBLOB="2000000000000000010000000200000062e432d6ebbabd2511bace736d92fd41c852168cc87a9c173141cccf719fcf85bb7af5e864a2dc5a07ea29880ad2453437f17166aceb4041245693a341e81453051ca66d39d6af6107edd547eb14e62a89c289ccce74268ebd08cc8522684a67e222a47191d16402c4d62394ad252a04ff1ec3868dc4236d19baf0b5c60841ae", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x80, 0x4000000}], 0x1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 15:05:50 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400000, 0x20) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000080)) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x87, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4210004}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="80010000", @ANYRES16=r1, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 647.127554] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26190 comm=syz-executor4 [ 647.239841] FAT-fs (loop3): bogus number of reserved sectors [ 647.260589] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26190 comm=syz-executor4 [ 647.293457] FAT-fs (loop3): Can't find a valid FAT filesystem [ 647.374024] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26190 comm=syz-executor4 15:05:51 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 647.486601] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26190 comm=syz-executor4 [ 647.508947] FAT-fs (loop3): bogus number of reserved sectors [ 647.554180] FAT-fs (loop3): Can't find a valid FAT filesystem [ 647.564589] kauditd_printk_skb: 483 callbacks suppressed [ 647.564596] audit: type=1400 audit(1547651151.460:28666): avc: denied { map } for pid=26196 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 647.599040] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26190 comm=syz-executor4 15:05:51 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) exit_group(0x5) ioctl$FICLONE(r0, 0x40049409, r3) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x82000000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) setsockopt$sock_void(r2, 0x1, 0x24, 0x0, 0x0) [ 647.658417] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26190 comm=syz-executor4 [ 647.738505] audit: type=1400 audit(1547651151.470:28667): avc: denied { map } for pid=26172 comm="getty" path="/etc/group" dev="sda1" ino=2218 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 647.804097] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26190 comm=syz-executor4 15:05:51 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x6) fadvise64(r0, 0x4a, 0x28, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r3 = getuid() r4 = getgid() keyctl$chown(0x4, r2, r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 647.848246] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26193 comm=syz-executor4 [ 647.893835] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26190 comm=syz-executor4 [ 647.935879] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=26193 comm=syz-executor4 [ 647.971590] audit: type=1400 audit(1547651151.490:28668): avc: denied { map } for pid=26198 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000040)={0x2ea4, 0x0, 0x4, 0x1ff, 0x1, 0x8}) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) [ 648.140207] audit: type=1400 audit(1547651151.490:28669): avc: denied { map } for pid=26198 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:52 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x0, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 648.270649] audit: type=1400 audit(1547651151.490:28670): avc: denied { map } for pid=26196 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:52 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0xe407fbfcbe331a1) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xc20404}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="000e51cd5f8438c006c81d2bc62dcfdd95fe67e9139bd8bc040000000000000000", @ANYRES16=r1, @ANYBLOB="04002bbd7000fedbdf2513000000640004001400010062726f6164636173742d6c696e6b00004c0007000800030006000000080001000c000000080001000f00000008000200000000000800030009000000080002004000000008000200000000000800020001000000080004000900000010000600040002000800010001000000"], 0x88}, 0x1, 0x0, 0x0, 0x4}, 0x40800) syncfs(r0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f00000002c0)={{0x0, 0x2, 0x1, 0x0, 0x5}, 0x7, 0x4, 'id0\x00', 'timer0\x00', 0x0, 0x5, 0x0, 0xd1aa, 0x6}) getpeername$packet(r0, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 648.412920] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.413026] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.444498] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.457721] audit: audit_backlog=65 > audit_backlog_limit=64 [ 648.472934] audit: type=1400 audit(1547651151.540:28671): avc: denied { map } for pid=26204 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:52 executing program 0: sysinfo(&(0x7f0000000100)=""/228) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$loop(&(0x7f00000003c0)='/dev/loop#\x00', 0x8, 0x200) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x3, &(0x7f0000000000)=0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) connect$netlink(r5, &(0x7f0000000380)=@proc={0x10, 0x0, 0x25dfdbfe, 0x48000}, 0xc) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0xd, 0x7ff, r1, &(0x7f0000000200)="88a01480afff4eac5e904106e151c8304f3d049bc2a4bbd73f235c863eede1abaa080bfbcd015da3c4b9c9c19e66ae208a0146d56d1bd27305d3c419714a09cd3b626ddf30b0b7836a55236bdf07c61650992a30f418deec8b9ddacbeace3605fc3ba5bffaee55de767dc6fb2c1db857362bdf0ee6f512adee45a376ca2c717da46c5e1b5ed4d6b368", 0x89, 0x8, 0x0, 0x2, r4}]) [ 648.651274] FAT-fs (loop3): bogus number of reserved sectors [ 648.718341] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:52 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4000, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000140)=0x3f, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x4e21, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xba2}}, 0x0, 0x1, 0x0, "e512302b158b65b903ec74e175557f50d63ee555b715ee652105555efbfe5ae0ecdca62f9c897a27e79ff61cdcac4966f2f70170238e0034c7e6b1278f7a78e4cf36e50bff30b071ae9839ef12390d82"}, 0xd8) syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r1, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4) 15:05:52 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000140)={0xa, 0x0, {0x55, 0x58c, 0x1, {0x6, 0x2f0000000000000}, {0x8, 0x5}, @const={0x2269, {0x8, 0x9, 0x9, 0x7f}}}, {0x57, 0x3, 0xb591, {0x8000, 0x2}, {0x401, 0x9}, @cond=[{0x9, 0x3, 0x2, 0xfffffffffffffffb, 0x1, 0xd147}, {0x3, 0x5, 0x0, 0xff, 0x27, 0x6}]}}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r4) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x4880, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:53 executing program 4: eventfd2(0x1, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x210000, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@generic={0x1, 0x9, 0x6}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000140)={0x5f2ce25c, 0x3f09, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0xafed29c627aa39ec, 0x0) write$eventfd(r2, &(0x7f0000000000)=0x5, 0x8) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000280)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r3, 0x10, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x4011) 15:05:53 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) 15:05:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3e00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x100, 0x0) openat$cgroup_type(r2, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) r3 = dup(r0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) [ 649.757870] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 649.950647] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:05:53 executing program 2: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x32, &(0x7f00000000c0)=""/49, &(0x7f0000000100)=0x31) syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000140)=""/191, 0xbf) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) 15:05:54 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x4, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) getpeername$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000180)={@mcast2, r4}, 0x14) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:54 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) 15:05:54 executing program 5: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001280)='/selinux/enforce\x00', 0x100ffc, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000000)=0x10001) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000040)=0xdcc, 0x4) read(r1, 0x0, 0x0) io_setup(0xfffffffffffffffe, &(0x7f0000000080)=0x0) keyctl$join(0x1, &(0x7f0000001200)={'syz', 0x3}) io_submit(r2, 0x1, &(0x7f00000011c0)=[&(0x7f0000001180)={0x0, 0x0, 0x0, 0xdcfeab117fceb4ea, 0x3, r1, &(0x7f0000000180)="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", 0x1000, 0x800, 0x0, 0x2, r1}]) splice(r1, &(0x7f00000012c0), r1, &(0x7f0000000100)=0x2, 0x5, 0x7) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000001240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x508200}, 0xc, &(0x7f0000000140)={&(0x7f0000001300)={0xa4, r0, 0x220, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3f}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x89b}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 15:05:54 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x9) 15:05:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x39, 0x2, 0x1, "7857d3c174eaef18198667f004dd709e", "27d98baddee97504bd540de16c21a0f8506ac03545ffa2208c62e44860022de0248f3f05"}, 0x39, 0xd5ded7ed007a00bc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) [ 650.974451] FAT-fs (loop3): bogus number of reserved sectors [ 650.980334] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:55 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}, {&(0x7f00000003c0)="28e7d515e105398b999388b190cc7a0ee9c232338a92e10fcb61e522088f331e9e5bca8739f4db96316411b2a150cc4a35e939b3d4bf0f032b201b784c774608dc36320cfead3f3efaf468989f6e808d53716e860baeb050f392ea4e91bde6655151b54e354de4235bcefac126532cd646569194ecb1a22aa5d895ad748250ee46fce1bd9c7ad54dd788ddf754", 0x8d}], 0x4) [ 651.203073] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:05:55 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, &(0x7f0000000380), 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 15:05:55 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0xfc7c) flistxattr(r0, &(0x7f0000000040)=""/157, 0x9d) 15:05:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) 15:05:55 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, 0x0, 0x0) 15:05:55 executing program 5: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) write$P9_RLERRORu(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1c0031f8669a6ac7f6fb241105000000000711000f00752e29487d29ecb98c7646a403009f"], 0x1c) syz_genetlink_get_family_id$ipvs(0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) pwritev(r0, &(0x7f0000000400)=[{&(0x7f00000001c0)="00ff6d4fe843b77f1b30edd465768787f17238c20ac4160acd641624b06fe69e2f57a19abeb3eb308ee9fe6c5606ace117b22791f2bc58aaded78f8d6ab58a883044939940bb30f00181d7ff20751949edca13f2b5faae741531df1cba3796d9158d5f36a164f0dfecec3f732cc70744ae06b5862e534022cd51f55cbbe3e53e9bdb5605fdcdd3eb3a622b6b7bd8b0b1384015f3e211c5740f6f132e0b6b27543de38df81087bd1e0fd6842c9afebc7018673794ac196c51419b06", 0xbb}, {&(0x7f0000000280)="7dec98b0d558ebbd802522df36b583ebf058fab96373bbbc4ba023de1ad7dd50185c7a4b742c831fdd00711f219300903c7caf77848bdee5364065039fe7f210c6a93a14f4abf5ab86ff463ba204a5ff912555cfde736f142c88498910d951b162bdb685902ab76df24785ebec144d30a5d0f7d1702301968d5c023acf9d63ecb755bceb1593a7264062", 0x8a}, {&(0x7f0000000340)="875209f05c0c839edfbd50583298bf16608f99d56b25237affb2784f84e3dcf5df4125d7af419e7404fc47070c93bafe7145cb273d64ed5ede6c79f5e4321f8d168ad9a107bd55ae3ae3e687d5705cc0a16be69f8fcb29a828542621d71ca1786307eb6b9c58d3dc544a933a0318eaa48e7d43f83351247eb0de2814e2a34e584008d90f8bda47563c6a7f57ddcc04450471f5472d504c1c0207d0817361089885181283ffad42dfb677ca378ec6c0", 0xaf}, {&(0x7f00000000c0)="7ef8878ff05463555ff6fc193e3f9843ce0db94558b4fff8dcdc7f65e1a5", 0x1e}], 0x4, 0x0) read(r2, 0x0, 0x0) [ 652.110097] FAT-fs (loop3): bogus number of reserved sectors [ 652.115972] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:56 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x800, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 652.332183] FAT-fs (loop3): bogus number of reserved sectors [ 652.384926] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:56 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) mkdir(&(0x7f0000000580)='./file0\x00', 0x1) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') readlink(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)=""/137, 0x89) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x58, r4, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x6}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x800) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) fcntl$getownex(r5, 0x10, &(0x7f00000000c0)={0x0, 0x0}) getpriority(0x2, r6) renameat2(r0, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f00000005c0)=0x5) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:56 executing program 4: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)=0xa38) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000001c00)={0x0, 0x0, 0x1, 0x0, [], [{0x8000, 0x12b, 0x8, 0x9, 0x8, 0x1}, {0x5, 0x7fff, 0x4, 0x8001, 0x8, 0xa3}], [[]]}) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f00000018c0)) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000001800)={0x0, @initdev, @remote}, &(0x7f0000001840)=0xc) bind$packet(r2, &(0x7f0000001880)={0x11, 0xf5, r4, 0x1, 0x2cf8, 0x6, @local}, 0x14) ioctl$BLKPG(r2, 0x1269, &(0x7f00000019c0)={0x42, 0x800000000000000, 0xa6, &(0x7f0000001900)="eab1f6a96850053b8bc5fd920ce6efec274f7c93041ca04960b1b0caadc848716f179aac81a3c1e81e48ab69f217426f7f356ba49c9b1ce1a0a13bfdb8b850182df130388b575688e46a47445bff94aad7c952540a9c1391cac2f0b863df33de620b4a94bfdc8e47b49b607ff9f73e8afca44602a7a14257a79832e1a9141a33e48daa1449b210d327228c63884b45cb51affac118204d7b1508ff1ecd6081e3484a052d1d4f"}) ioctl$TCSBRKP(r2, 0x5425, 0x80) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getuid() sendmsg$nl_netfilter(r2, &(0x7f00000017c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001780)={&(0x7f0000000340)={0x1404, 0x1, 0xf, 0x220, 0x70bd25, 0x25dfdbfd, {0xf, 0x0, 0x7}, [@nested={0xec, 0x8d, [@generic="dd5f2af6abc3722bb5cffe3a2da6c01eda65d7b50f606770b48510cb2b9115dbd7ad3c8173bc651d1bd34635ffd608d1ab824b5fc770392011ecb5dcd01cdbe8fc94db616003adfed401890ee63912ec683f166593b651bda32b3166992890ff34d5cb7e17700dfcb6abf80b919b2ab974c232de01b042808dbc96273e09c633f86cf0b3684ec91f5e38dbc3830ce81f559598d00d", @typed={0x8, 0x6f, @ipv4=@loopback}, @typed={0x2c, 0x1f, @binary="ab0a4fd5a3b9d0a840c144b26b3ad866745a65adfd212125d9b4654ce6ca894ad6f4446975"}, @typed={0x14, 0x79, @str='/dev/keychord\x00'}, @typed={0x8, 0x39, @str='(-\x00'}]}, @generic="997ec89b28b79a3540d6e7d1296a54034c7aa3e003474666bd61522259894eabc6bb6b01493abe8ba0fadb2461ee4d664e36756c9ab2e8859f631979f7ceca887849c08c6c0b181295ff5d72c67cf9cd1b5b3a54e2290e404ba950f31f5a06c04c528f1c359f57dc490885efa88ec61856ba96c0386312190018e2a4bbc4350dd7db428394a1e021a6ce1424fbda41b22d27dabc7a666c18cb7292b218fda106c98d101bb5bec3ed9d35107aacf6232ea4dad8ac0a0619b43306271428f40219b8eeaf8dee375011ffbd84cf0736a41b5359f9324fbe", @generic="fa1b7cc01fc7d0b67f69bccba838e149068accbc422f423e55e057059a940c99baa716125593fb08d7aa5ae1c203b26f3087958f2520341319ca88e817aa0fde61876ae0def7e0c4846642b5d67e37c251bed8bd5e567bd0e830a8a425768858dfeb5f9789d46870f5485525e1c224cb2479c1e077f81282eaac5181b93a920287d5aff5975c50eb96bf7928461579776420e6d07f84fc6c10c5bad2059e920aefc9a3c90d667b28b6210675bd74de44912dbd", @nested={0x110c, 0x11, [@typed={0x8, 0x4c, @uid=r3}, @typed={0x8, 0x16, @u32=0xffffffff80000001}, @typed={0x8, 0x49, @fd=r1}, @typed={0x8, 0x22, @uid=r5}, @generic="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", @generic="33cf7f0dddcdab300acb8c94ef5cfde8195ceb159fa846aa1521dfc80a0e6658d0d298998834aa01c894d50a2c44dbb059cd69a021f2b198bd16e376ecab4c3784027ae48f713e800cec0575", @typed={0x14, 0x7, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @typed={0x88, 0xd, @binary="9544cad738a7b483db748a73f42449e2d416897eba04bc5c9126f8ef468f1a19ce02ff01dc42989f985a23153fae0aece92125cbbe4046cce7b84b2c11cd3bc84f6ef88a058c0e49918d18a93dd812eb332883d867ebca7876144fa5a67561f2a693fc3898bd3f376999cb62543445451cc172d98354df5216f6db58a50da36bec26"}]}, @nested={0x10, 0x3f, [@typed={0x8, 0x11, @uid=r6}, @typed={0x4, 0x10}]}, @nested={0x4, 0x15}, @generic="756c23e096bd4058a5f3eb03870d47f623b06265c6a15ea07276e92aac07c72649175d55a6043af024fc7e41531944bfb85840793fbdc09ec33007f090ff6956d7224b60048040f7c7c47fcd082b5e4cff4f81e34c15fc8ed35d03"]}, 0x1404}, 0x1, 0x0, 0x0, 0x1}, 0x20000800) [ 652.600129] kauditd_printk_skb: 479 callbacks suppressed [ 652.600138] audit: type=1400 audit(1547651156.490:29104): avc: denied { map } for pid=26350 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:56 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, 0x0, 0x0) INIT: Id "2" respawning too fast: disabled for 5 minutes[ 652.840745] audit: type=1400 audit(1547651156.530:29105): avc: denied { map } for pid=26350 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:56 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) getcwd(&(0x7f0000000040)=""/16, 0x10) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0xfffffffffffffecd) [ 653.049521] audit: type=1400 audit(1547651156.560:29106): avc: denied { map } for pid=26350 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:57 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) [ 653.260126] audit: type=1400 audit(1547651156.620:29107): avc: denied { map } for pid=26350 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 653.386592] FAT-fs (loop3): bogus number of reserved sectors [ 653.440204] FAT-fs (loop3): Can't find a valid FAT filesystem [ 653.448515] audit: type=1400 audit(1547651156.620:29108): avc: denied { map } for pid=26350 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:05:57 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r0, 0x0, 0x0) rt_sigprocmask(0x1, &(0x7f0000000040)={0x2}, 0x0, 0x8) prctl$PR_GET_FP_MODE(0x2e) socket$inet(0x2, 0x7, 0x200) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') 15:05:57 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, 0x0, 0x0) [ 653.572347] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.578212] audit: audit_lost=861 audit_rate_limit=0 audit_backlog_limit=64 [ 653.611363] audit: audit_backlog=65 > audit_backlog_limit=64 15:05:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x0, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0xffffffff) [ 653.623970] audit: audit_backlog=65 > audit_backlog_limit=64 [ 653.660065] audit: audit_lost=862 audit_rate_limit=0 audit_backlog_limit=64 [ 654.105268] FAT-fs (loop3): bogus number of reserved sectors [ 654.161570] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:58 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_create1(0x80000) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:58 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x101800, 0x1c0) fcntl$dupfd(r0, 0x0, r0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r1, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0xfffffde8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200)=r3, 0x4) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0x80, r4, 0x306, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xf2f8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x80}, 0x1, 0x0, 0x0, 0x400c840}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f00000000c0)={@remote, @initdev}, &(0x7f0000000100)=0xc) 15:05:58 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}, {&(0x7f00000002c0)="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", 0xfc}], 0x3) 15:05:58 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200000, 0x0) write$P9_RCLUNK(r0, 0x0, 0x0) 15:05:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000040)) 15:05:59 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = socket$unix(0x1, 0x0, 0x0) fdatasync(r0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r1, 0x0, 0x0) 15:05:59 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}], 0x2) [ 655.149402] FAT-fs (loop3): bogus number of reserved sectors [ 655.196358] FAT-fs (loop3): Can't find a valid FAT filesystem INIT: Id "5" respawning too fast: disabled for 5 minutes 15:05:59 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x40000, 0x0) sendmsg$key(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x2, 0x8, 0xd8, 0x7, 0x8, 0x0, 0x70bd28, 0x25dfdbfe, [@sadb_lifetime={0x4, 0x7, 0x8000, 0x3, 0x0, 0x80000001}, @sadb_x_sa2={0x2, 0x13, 0x39, 0x0, 0x0, 0x70bd2c}]}, 0x40}}, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000002c0)={'ip6gretap0\x00', @local}) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000180)=ANY=[@ANYBLOB="6e61740000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="0000000000000000de1f00ffffffffff00000000"], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xc8) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000500)) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect(r2, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, r4, {0x2, 0x4e21, @multicast2}, 0x3, 0x3, 0x2, 0x4}}, 0x80) symlinkat(&(0x7f0000000300)='./file0\x00', r3, &(0x7f00000003c0)='./file0\x00') ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000280)=[0x0, 0x100000000]) bind$unix(r5, 0x0, 0x0) connect$unix(r4, 0x0, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000600)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) write$P9_RRENAME(r2, &(0x7f00000005c0)={0x7, 0x15, 0x1}, 0x7) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f00000004c0)) [ 655.409353] FAT-fs (loop3): bogus number of reserved sectors [ 655.481503] FAT-fs (loop3): Can't find a valid FAT filesystem 15:05:59 executing program 3: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffd, 0x36f, 0x0, 0x10, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:05:59 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) eventfd2(0x6, 0x0) 15:05:59 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) write$P9_RWALK(r0, &(0x7f0000000040)={0x71, 0x6f, 0x2, {0x8, [{0x2, 0x2, 0x3}, {0x0, 0x2, 0x3}, {0x1, 0x2, 0x3}, {0x86, 0x3, 0x8}, {0x80, 0x0, 0x1}, {0xc2, 0x1, 0x7}, {0x0, 0x1}, {0x12, 0x4, 0x1}]}}, 0x71) 15:05:59 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}, {&(0x7f0000000100)="b4355b17ab1568a288b7e8c2d48714e93e165d831ff9916a4ce55c72c5b22761b6b4afb84e2b64dc05e43cfee0e1b71900feaf881cb0b1999b6778186ae00eec15dbfd137af21ddfbce8e4e0298d49efb2cc53d48cee188cbc1a538971d746f8ea889ba63389b20f8a473f11a5cc42867fa1223f5821463cae3e8923cb6755840266c15663bd399a51879c0574750d9c638ae3cb647b098fc64d039542caaeb0c4dfa35a952e5457ad78dbd24c2a79d48d7ad9438d84fe34a6f34c7eb1adcca66c840462f85467878a8f905c142df6d42041c85716dae1236c58b058ed08a2ca32eb", 0xe2}], 0x2) [ 656.279001] FAT-fs (loop4): bogus number of reserved sectors 15:06:00 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) r1 = request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xfffffffffffffffc, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r5) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) keyctl$setperm(0x5, r1, 0x2332) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 656.337269] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:00 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x2, 0x0) read(r0, 0x0, 0x0) 15:06:00 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000011c0)={'security\x00', 0x1000, "d8c1197174e351e64d5d49c85e8e986d32913b97e9f2f100f00afacb921e91d973ad7d6b178118c5b921a6ec9d4fd0562886df5cca862a401f6b32448c945be90d0923cbddc9d8576ab6d074dd4ff4a2e0cbcd6ee9667762315710c8ad2962d9d72d285acda313c37c0b03d34b21c0e49ba75df9066f9b9e4f8b53b4ba260eaa95cbf2a044f6534c75b5b4e3f685a3be9653e350789c32317b47e757e53b6241732f97b6afe4dfa9f3580dcc230e0894039272e24c00d8e087a97cc54a76fc18402baf0e879f7788394638f2eded97daf758f8f8c124312e69634c1bba2233fd3f9c13611c37490ae99e9a144f24d00645731d41f2a7a093001abeb9c27d7251ea52237ed1a5419719972ea2723a7dcde4177792fb5a605436bb51a8b0318e9f71ca83ac82ddf74f22cc0bb0604b64f54824d4328d45e385dff5220122c32ee954559b20745196b5c78bac2a2dda51d26afc5e9f6b0dd4723464204a92e3c460585bf7c0ff031e40a25785c66c95b3e5ce3ece9f3ba6ff42f528952179e9bfa94e0b5c503e2e82e1377fa0de019a247228a1cbf1de5310ff071fc848944b44770d109aca72e22fa3e79fb1de7230414b43335c76857448f1a460787bb0b255bb902498e3a9afe55eaa030726e5c37abf5f61dec11945af9aa8d83faf1e60557c7e30e19215491891ce08139abaa86bc4ecfc07e6bf5affaeacc4d1568ce4a940c9076af304e72b6cac262e1a1b41756c2edcc95b310c988ee1b84a1eeb9e1a8b9a2a6f814f30e24ead0a7dff068228ae6805ada8b3284743cdd6e26ea1cb6edcd55142634da2dbfe3012e7782f64e2e57a59aff3fa2e70b4a2c4228da354482a94836dd282bdf322d07d2d7ed92b51f6f293f3e1b2f1040e4b9c2317e4fe6f27934baae620546cb8639b1433714a40e82f2d6727d6686ea14d69c42d725d83327c4c6ca9bbb6aa7bb5d894a59889ed2442da7f8331ea4560faf8685e08d40a18786b8d2a1a9938c5fca834c39c7197f163ed1e9f53444e35eafdb7c24cf36e108a510223b76c9125505dbc3634c11feccf6181592e477a94d8b65ff9d51deadef384b3b7ca9f04f307ba91f5659479add23ceab7f3ddc7b21529ec79911759b598deea50fba895d2d41aaa380c827912e4932331a6805e4bb1fa2638223a80674b7c66c9e0fc3331e268ea329372d1b350f393340aee35dc19eecbaaf5a1b5cd389dd880993bc5894bd06795c820212c410c16692ce3112ade2226ddb067cbc2c0764076bea94127db564c836348f3b74b677e372b04d94bae859d36f7a033943dcb4ddc796d1d362df994f107c42fee2edaecd8b69029dee0d62226895ce945803a9b7f874f2ae7b880bed5f3bcbad857470ac9d019db2ded92caaead5c1ae5fdc03e5ccdd52685b58bdcb95c716697b15543e076c86c994518a6508178392cfd692cf33c5eeb62348994d12916682d114ffa382b1391a9547f3542a7bb4f0ad26a1f9367d93b71b61d4fd13d0cd6b91777a00396ab433eab13c9c99862fff742c525387abe112d54c594e0e08eff6c6352622624dfabe0f6b4bf76173cb29bbbbbe6971b365be2024809e6eb6a0ee4a901f9098d32c9a74196ef5234e2abbc57b08e65990f31bf355b222d60d81633c86e1ef39e06ed0efdbdc5ee4ed125c9098ecacbd90703095d95fdcc9bda86adeeedbf470be921bffa4f87374650eec4729cad6f95aab3fa5c0d55fb52da53dbd9731b4d718b5d7584db98a2d362e44d23012e2b1d3cd23fc801c63bf8ed444a1364e714c53c7673ef79b84e16e0a3e3e41dffff9720432171d9be3ed96f9d7b077ced5ddd81bfe65a9ce89da6342fe1999f7914d164d88e518843d2b33eacb3f8f00a72d7b50f266f6edf9cc4ab1c600a199a577027d0939b674afe8ab84ece59c31f5480f553eae3b3be69fdca6cf2f0170a2cc628d3b29a87aa240b90ea85d7a573da75e2e8700beec19afd4520a7c29352f4b223049dc2eccefbd5adf48f507ae134e5f85be3b95b944467e03f62af2f38fef0d238d077e8f05861208576bc9cc2d5ba0fe31cf82840f36e50a7be4bc66d5883d0726c9062e44f57677d30d18806d952a7d4911d82eb05631d9d14521ae9daf7b2b239ccd05ffbebc71a2fb4a1385930f68781c56638bddc2b81821561416082e272a46d836bc01246cfd2bdd0f6b58fc1ff23f79400479ac3b51db5a2fc75ad086978661871dc59610c8629a4684a2ead91c6201b36f02ecd24a973364cd747fe3bc4b14b273c0d2b43cdb64ef9111fdcc115ac41b7cc76c4e44b3885b75bb36b5887737885e88066f87e42eb4f354057d12732d0c951e05b9bbcf0f738dab4b1549f8e5abffea6d4fe381e6297e89ff561b0b18bb5675ed4a4375576b35cf3f725afa84d3c74d2674da3b512555cde9bb32e84365f079514bc4031a334de0b15f1e664020f2b5e7d3450bf44d0fb8b4d78b40280b518320324d4e05feda0e8836609ed3faf4cdd7a516582700d88e1e4c0b0f791bfaecc119024bd7f6d11613300e517c332d49762d9706fd5a94c4aa4a26df3f5bab110010a416e6a3f8b5f42bb5c314d905222ee9f8f90d1ef6d010b7eed53ffbb453f3dae308757d0868601ec5ac8e6572fde7317380e5b4b1114be722a3e6a9a3e1db00e27ebb54d913263fe33ef6a7f913c133febc825e395dc7351b2245c152c1caf47921ebc00219a18e522af75a27c908c0e93acfa69108fc3d7c40d6ef684aac3350951b9ba07107089fc17fb8a401faca3fdfa74ca335146e1096367b73a3f3f593ebabf3f1c84b14e4db62e5b6a98809993e5a47ea9c1f486fcd5259c0d717f24f7e41139821e8fea3aa0d17c8ac52693744fc293d298436720648184172c1cdc0194ba6efe5a1ab53899e7ea20ce51874cc180542821444ff90e57b6a1243f202436dd2e2c1dbc1033cfd74512198e31dbc97544923334d3d8df1d52f370c002f1a97aace61fb4444bbeb3faa60c5a6d63d2bfb0007d0e82b1c001a4335a60f52d994fbccef48763dfaeaa2aad84ec83ccf8e16bdc523186f6c7efb21a55f131f58dc59b909e45ebb8cb96386e8d2835713687062fce2bde063ee666d14ab53581caf9d2b10fcb88881035aa04afed90ec574bcadae4d186363ecfc8010403f8db83b2cf7e9ea9ce5581e84f37a037be9c2909f57f7356d9811e7f803bc6333c898a1e7f325a15931457952443e170b7435a7bfad9787f409cc65638da5f6a5de9ea021e86c9bef30f6ea1f5567e7ac09213ea174d990d483a6ff9ee7f348a92b9f0f55e603d122bb3fb1d82151e598fe06906d9b979957113b384f077163d62123bb7152d169a3dc0188f692f6ec1258562b7028ecbe0653bdc7d61c7b79c7e2be33fd111337ef39974f3d53c9634d06502429c067297f456d5695c3bae8e2df137386dcb1f0d8eb8435742d509f481c1c77c329c9b1c333fb787db77ac3b59bdc8070d8d30ba86a6ed9515444461ed43dd160be67081f5c7f2aa73c7b4be157ca2a5dcfc3de20475a1be60041443eec1016647acf1ef5cf2b196146ce7e8c9dc582a2b8f97597988f6c0fb11c8d4c7e983f42f0ff632daa1824d19ce06177908fc14830a49027c5798509658870368585db53570cdabc7567725db3496d8b87a5153079bfee85bfe69ca6486ffcd1e785d6e9f1f54c40f00d9982bf394435074f2a289f74964cf12e4300fb69eaab2b2d4ce89ad717dbaa2429ca6964c4ac3ba40d1b55ca88118fe22c69e30193fe93fab3768f256837801f02b94f97bb7580642316fb9c382cbc42e1a7b75c9e06af7667bcaa0fff3e66dd5954bb2950ce62b3b73635250df67f1f2b22ee7d1199f2b7c79078b9bb26c47a791c970a5398f869399e4006dd361a4711d58f7b4378a0d5d0d822e2ec4d9cc6453d9b6f646397c869cf7e5f2dca82888e905a1951d5900645f59f9bb765fb76f5d9146c7fd5692e256a63fda7fbaead62d51c9bc9703d154c6ef68dccf38ba2660519b5c7fdfeb0a2d33d4199c00493ec65d7b6c5574e28446d27bf2d769797ee9062aba3c57a997dda0fa35e7d86695fedc0d634b86abf0ec7c0277890095681d0a6f20fb939cb5f355536c648d284337f325100ddcd7a5571e4f6af1bb87f81146d2bbabf8d9350a97a5058137741f7340b3520b98c20d1beae84e34967f491e9192b32cf2a5ae7ba9e13a3cb4fffc3ec5b974bb9148e23e022f32b51b446f537ae6845044826b4e8b3a098f4be03b7ccd60a4759e92c92fa05698622a360dce580786e129c145cbd9a13cbc7c1c24a729e2aa770700f8b9399202261b60af6361b1ddeeda210772ec89b3411d4c4c84a2d5a7b44133a8ee3c16c0d046ad954af50688d113a57730c32c4be145da79876466df4a41e15251da25c4768eb1df533344643632cd0cafd66ad46b60603a7afbcefe8125db9dc6ec972c10885bb4afcce324dd5482c073f7c604f4e098e5ff7591728954f152eb6323fe34ba044e1f6c8afec9872e2aacf21c37c6ef24525c9846a0d9235648d42aeb691582100c4a66d5f7a37f8a659713334d1d477aaf59d52f3c65dec77438291a5ef5dff69ba3d512043875d119989baab04bb43d0b0d8493256d8ff0bad341e1be81903c0bd0764817fd7ce1c338e863d963275850894322e7f1d8903d0f6bd895232951b26f5abeee91a243745c0b89726a170e12de4b33cb7d19579b0efd883c2089c5de16f4470f373bd5cc8deeaaea2174b8caed42a93e12de71b3f95ff1f024ada92e523d5bac18c6c87d4937cc026c9e179be5f5c861bd36962c66a892e03422cfbeccc0c2cc541308314305c616e6fa5f880679897a28afa849afdcd3953daf07f9369ad11152755e1e86bf7dbfff7df9cbab9ad8df73ab0b75fc27e5f4a1406d0e59875283f783ba33e8cf60d3427b180fe957ca217d4e6f76e1998bbc4db2af98b9c8f62bcf0294bac98b967eec1d222e8fc9e51fe10f1b2837e7059b6bd3ac4f51df3f3f1e47c4fb51794663f5f5b0af4c83c954afbf8afdad21379870e27177e21bf74ed997870ce6f1a615492225907729cf7980da8582768b3d3f8dae87618dc4cf8310ff84a5264907178700c442ac7698bdaeca05046de4860c1458818623f4c98b68d4243c8c9b9cad6c40d2515734e8d2b419bf81b7dc3af21dcd4e7bfd96d3b63cdf3e0819f05cd3fe806f5460a268770e88bcf76e5ac6965d9490a97d0d015a8ecd26d90cdb27b5db17288e5e9d791c5333c7b0f9ab84f44eb15d4cfeeffe0e1140b8bb4b66fc5055017ae80a2885d4a9d221811f80fb705b9d30c8dccc7ca875000ee36da79d7f9de698ae0e4b3b7f7fc1547f1eed8aca38f06c419a19c7aea60f39c81b541fcc8b902509e7987f1963748f99253de35be60502fa16217a6cd339242111e16e54dfeb91ca4c11575d2da00bbf36004f9bf440bec9668a2e07ef51f31d1d213c89f3cbba94e621e93d1200b957e7080789a8c40c94b8f58e9639908d3eedd0beea346ca90aca45dcba63f91134a76530bfd7bef341ab15237975f88d1c8c404ea40a2be02cc6306250d0937a4d06a12c7c5dc35f8549a8b19fb3e35549e61845e80a165e7dec274c1439ff811f39fecc4b6384457accb94991e31bb111e8c6adf093654d4242c751bc45a76d1e64dd47307225bf46a8ccf4dae8b1046587e597e26bbb2637416547a4581e4abebf413ddb2ea4dfcf48e05d8df4dedfdb3e9cac894831bb17dc73f83a5ab28435f00049c00cf99f7f90391b779c1ea7"}, &(0x7f0000000100)=0x1024) r2 = dup2(r0, r0) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f0000000140)=""/4096) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000001140)={0x3, 0x70, 0x80, 0x101, 0x80000001, 0xd59, 0x0, 0x3, 0x201, 0xd, 0x8, 0x100000000, 0x3, 0x7, 0x1ff, 0x4, 0x0, 0xfad6, 0x9, 0x5, 0x9, 0x45f5, 0x1, 0x7, 0xad1, 0x7fffffff, 0x0, 0x40, 0x8001, 0xff, 0x9229, 0x6, 0x1, 0x8, 0x6, 0xfff, 0xcd, 0x8, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x5, 0x7ff, 0x180000000000, 0x0, 0xfd, 0x3, 0x1f}, 0xffffffffffffffff, 0xa, r0, 0x3) 15:06:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0x255de7ba0fa6642a) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000140)=0x80, 0x4) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) recvfrom$unix(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) stat(0xfffffffffffffffd, &(0x7f0000000240)) open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$TIOCNXCL(r0, 0x540d) 15:06:00 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}], 0x1) INIT: Id "6" respawning too fast: disabled for 5 minutes[ 657.170089] FAT-fs (loop3): bogus number of reserved sectors [ 657.216112] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:01 executing program 2: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r1, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x0, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc9c}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x738}]}, 0x24}}, 0x80) 15:06:01 executing program 0: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 657.486832] FAT-fs (loop3): bogus number of reserved sectors [ 657.572077] FAT-fs (loop3): Can't find a valid FAT filesystem [ 657.615751] kauditd_printk_skb: 412 callbacks suppressed [ 657.615759] audit: type=1400 audit(1547651161.510:29511): avc: denied { map } for pid=26490 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 657.648459] FAT-fs (loop4): bogus number of reserved sectors 15:06:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000000c0)=0xffffffffffffc902) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000140)) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) INIT: Id "4" respawning too fast: disabled for 5 minutes[ 657.698717] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:01 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}], 0x1) [ 657.848574] audit: type=1400 audit(1547651161.520:29512): avc: denied { map } for pid=26491 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:01 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) r1 = request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xfffffffffffffffc, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r5) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) keyctl$setperm(0x5, r1, 0x2332) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:06:01 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) read(r0, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) INIT: Id "3" respawning too fast: disabled for 5 minutes [ 658.060126] audit: type=1400 audit(1547651161.540:29513): avc: denied { map } for pid=26490 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 658.262240] audit: type=1400 audit(1547651161.540:29514): avc: denied { map } for pid=26485 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 658.401877] FAT-fs (loop0): bogus number of reserved sectors [ 658.446354] FAT-fs (loop0): Can't find a valid FAT filesystem [ 658.475027] audit: type=1400 audit(1547651161.550:29515): avc: denied { map } for pid=26488 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 658.608058] audit: audit_backlog=65 > audit_backlog_limit=64 [ 658.609593] audit: audit_backlog=65 > audit_backlog_limit=64 [ 658.626875] FAT-fs (loop3): bogus number of reserved sectors [ 658.632063] audit: audit_backlog=65 > audit_backlog_limit=64 [ 658.637716] audit: audit_backlog=65 > audit_backlog_limit=64 15:06:02 executing program 0: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 658.643700] audit: type=1400 audit(1547651161.550:29516): avc: denied { map } for pid=26491 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 658.668336] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:02 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbbe8e46e8250767c21dea839aaa1b47d9184226cb9c1cfdf13f675861db113553a9eae4cef6145747b560304980d913450d3084a2c7d9406257a61c6edcda50435b7ab94e65bde26a54c", 0x93}], 0x1) [ 658.840804] FAT-fs (loop4): bogus number of reserved sectors [ 658.872076] FAT-fs (loop3): bogus number of reserved sectors [ 658.895652] FAT-fs (loop4): Can't find a valid FAT filesystem [ 658.937738] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:02 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x10040, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000080)={0x0, @speck128, 0x3, "47841f6ff17ab09c"}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r1, 0x0, 0x0) 15:06:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2008}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)=ANY=[@ANYBLOB="50000000250a902c53d792d58e37b5945baa24451f10890a6207cb76e491408a50f63fe3b15702db2d386c1f114abc96c89601a5bb8abe5ae68f1d172a8e0b3e33195709a279c8ea578e897edbc4c8176e5dc1dfe0f67507490d8c3eda89a2cd67ece709d1501f2ce4a529b87adecb42da57f56f92d72e60b8d2aaf54a88047bd11449d87bf0cc2f25254685483711d44bea771096d36d7ff25168", @ANYRES16=r4, @ANYBLOB="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"], 0x50}, 0x1, 0x0, 0x0, 0x8800}, 0x894) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) setxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@sha1={0x1, "76a0a13de68db3b55aacf42513266cf398d5bdfd"}, 0x15, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:06:03 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r6 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r5, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9af}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x28}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r6, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r4, r5) write$P9_RCLUNK(r1, 0x0, 0x0) 15:06:03 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/193) read(r0, 0x0, 0x0) 15:06:03 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480), 0x0) [ 659.542941] FAT-fs (loop0): bogus number of reserved sectors [ 659.548797] FAT-fs (loop0): Can't find a valid FAT filesystem 15:06:03 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r6 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r5, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9af}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x28}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r6, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r4, r5) write$P9_RCLUNK(r1, 0x0, 0x0) [ 659.931765] FAT-fs (loop3): bogus number of reserved sectors [ 659.988312] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:04 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480), 0x0) [ 660.484747] qtaguid: iface_stat: iface_check_stats_reset_and_adjust(lo): iface reset its stats unexpectedly 15:06:04 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x3ffffc, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) [ 660.682656] FAT-fs (loop3): bogus number of reserved sectors [ 660.744673] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:04 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0xc8, &(0x7f0000000080), 0x4) syz_genetlink_get_family_id$ipvs(0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r2, 0x0, 0x0) 15:06:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0x525a4829d6b1239e) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xdbf, 0x401}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)=0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)=r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x14c) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000240)) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000200)) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0xe4, r5, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x74, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x33, 0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x18}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1f}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x280000000000}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x80}, 0x804) socket$key(0xf, 0x3, 0x2) 15:06:05 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480), 0x0) [ 661.429227] IPv6: ADDRCONF(NETDEV_UP): tun0: link is not ready 15:06:05 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, 0x0) 15:06:05 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r6 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r5, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9af}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x28}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r6, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r4, r5) write$P9_RCLUNK(r1, 0x0, 0x0) [ 661.778873] FAT-fs (loop3): bogus number of reserved sectors [ 661.836911] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:05 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) 15:06:06 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{0x0}], 0x1) 15:06:06 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) read(r0, 0x0, 0x0) [ 662.477382] FAT-fs (loop3): bogus number of reserved sectors [ 662.551983] FAT-fs (loop3): Can't find a valid FAT filesystem [ 662.556984] FAT-fs (loop4): bogus number of reserved sectors [ 662.627482] kauditd_printk_skb: 493 callbacks suppressed [ 662.627492] audit: type=1400 audit(1547651166.520:29963): avc: denied { map } for pid=26631 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 662.672887] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:06 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 662.877661] audit: type=1400 audit(1547651166.550:29964): avc: denied { map } for pid=26640 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:07 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{0x0}], 0x1) [ 663.132739] audit: type=1400 audit(1547651166.550:29965): avc: denied { map } for pid=26640 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 663.193668] audit: audit_backlog=65 > audit_backlog_limit=64 [ 663.202932] audit: audit_backlog=65 > audit_backlog_limit=64 [ 663.221290] audit: audit_backlog=65 > audit_backlog_limit=64 [ 663.235052] audit: audit_backlog=65 > audit_backlog_limit=64 [ 663.260174] audit: audit_lost=883 audit_rate_limit=0 audit_backlog_limit=64 [ 663.268579] audit: audit_lost=884 audit_rate_limit=0 audit_backlog_limit=64 [ 663.278172] audit: audit_lost=885 audit_rate_limit=0 audit_backlog_limit=64 15:06:07 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, 0x0) 15:06:07 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f00000002c0)=""/191, 0xffffffffffffff5d) write$P9_RCLUNK(r0, 0x0, 0x0) [ 663.767848] FAT-fs (loop3): bogus number of reserved sectors [ 663.820748] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:07 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r6 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r5, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9af}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x28}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r6, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r4, r5) write$P9_RCLUNK(r1, 0x0, 0x0) [ 663.964562] FAT-fs (loop3): bogus number of reserved sectors [ 664.001864] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:07 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{0x0}], 0x1) 15:06:08 executing program 5: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) r1 = request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000140)='rxrpc\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f00000001c0)="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", 0xfe, r1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) sendfile(r0, r2, &(0x7f00000002c0), 0xa81) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f00000000c0)=""/23) 15:06:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)="c639a25a332cd29b3fff574c73d6cf1a3f2822e29fb405d04f49f4fb5eb45dc4b2fde5c1fe33e80274d32aac403f4833177844c20cc63e219789a490a0f2b4f54dd11c7f6af0a85dc1ae8843361cebbf7c1f0212d41c8d5f264534a2e995842644f77fba7494ff0566f53f85e469a611fbaedf88b16d8e4d11d3bec04f3c3dee67a45bace7526779c85ff943cc8db2a95869bd7f65a371", 0x97}, {&(0x7f0000000200)="eb592aeecedcc413c6bea2f39090de565ec313ded9b4e7692d32c56b83e3a5172b624515f8399cecbbca5b0b0359115311473502cdf06e4b8c6cb19f9562b1df42191a76bb53a6c900b89b3e41ea8f6bc72d35e6b6eb6cacb1940fca9c06958ce6c78309a0d8ab2ca648a9", 0x6b}, {&(0x7f0000000280)="f7643ebe89efbe637121267d12375a12e452bda4ed5504ae18f1baf0a78a8fe660e06bf3aea02f7ecce9124f23ee5af1644c1c1b46b9694983cb3e81aa2e7130445c9dd888928f351cc93a0676ae39382237f3fe5b7eb11e97d7ba3b469022fed931d8b9da8902fbc4cfe4de578c91c3993fc9ffdcc619d03be1cbb099a6d8cebb8d", 0x82}], 0x3, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 664.258499] FAT-fs (loop4): bogus number of reserved sectors [ 664.330096] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:08 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, 0x0) 15:06:08 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{}], 0x1) [ 664.943510] FAT-fs (loop5): bogus number of reserved sectors [ 665.003628] FAT-fs (loop3): bogus number of reserved sectors [ 665.006316] FAT-fs (loop5): Can't find a valid FAT filesystem [ 665.009453] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:09 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0xe7, "8172973cd7dc213e18229938241057a477ff5ac20fa32284a3c1196d96581e553d5cc3780833dd0ad74b6302fd9c60ca8c2d8c37c833f781270f4816e37be95d435dcf32533debaad70bf92b649a5d2ed28398cf3ab30fa0c05d4314d83db42e1dd5fa1fd75eb350abca76597b1b1a7aa55d9301a7cfa64e091925cc73e044966e549c3ed01aa72f9e194d2bf48e8accc89d2cf308863778677d05b2980f4888166ef9c844130f0fc7800b89f673207a047b71cfd8cd84f38c0c6046a2d725747d729877c064b4c0d93369cf25ce1ef4224dd96149d2a830002c5ecce07265f053704aec8e46dc"}, &(0x7f0000000180)=0x10b) [ 665.237974] FAT-fs (loop3): bogus number of reserved sectors [ 665.319169] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x2000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4, 0x16, 0x15, 0x10, "679500a776511d20f140af3454b3ba15a2968c78da7e61dc81fd416d569b5b1544b4354ef066678999928e846429e38a085cc7cfef92d08af9e7ef3b4d74c550", "57fc9f8ec1d093eb55deb970331eaee3f0d1f33b42daa71bdb142a3f1f89ad08", [0x3b4, 0x3]}) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x82900, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(r0, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:06:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000240)={0x5, 0xef7, 0x2, 0xebd, 0x5}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/context\x00', 0x2, 0x0) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}]}) [ 665.562630] FAT-fs (loop4): bogus number of reserved sectors [ 665.610098] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:09 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{}], 0x1) 15:06:09 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:09 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r6 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r5, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9af}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x28}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r6, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r4, r5) [ 666.214371] FAT-fs (loop3): bogus number of reserved sectors [ 666.288709] FAT-fs (loop3): Can't find a valid FAT filesystem [ 666.478737] FAT-fs (loop3): bogus number of reserved sectors [ 666.535746] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:10 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0)=0x2e, 0x3, 0x2) time(&(0x7f0000000040)) 15:06:10 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{}], 0x1) 15:06:10 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x402, 0xffffffffffffff75, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000140)='system\x00'], &(0x7f00000003c0)=[&(0x7f00000001c0)='syz', &(0x7f0000000200)='%*\x00', &(0x7f0000000240)='syz', &(0x7f0000000280)='ext3\x00', &(0x7f00000002c0)='/dev/null\x00', &(0x7f0000000300)='selinuxbdev,vmnet0:,em0(wlan0vboxnet1\x00'], 0x1000) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 666.933394] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:06:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000240)={0x5, 0xef7, 0x2, 0xebd, 0x5}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/context\x00', 0x2, 0x0) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}]}) 15:06:11 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) 15:06:11 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f0fc6998fc57bc5a8da241deae25346d5e29471b8b29bc92022e2e8f9e4822f056a676dbb", 0x4a}], 0x1) [ 667.632743] kauditd_printk_skb: 422 callbacks suppressed [ 667.632752] audit: type=1400 audit(1547651171.530:30377): avc: denied { read } for pid=26771 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:06:11 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10) write$P9_RCLUNK(r0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000080)) [ 667.814685] audit: type=1400 audit(1547651171.530:30378): avc: denied { create } for pid=26771 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:06:11 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r5 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9af}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x28}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r5, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:06:11 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f00000000c0)='encrypte0\xf5\xb2\x945|4ik\xf6\xfbd\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f0000000140)='ppp0ppp1et(1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000016c0)=ANY=[@ANYBLOB="73656375726974790000000000000000000000000000000000000000000000000e00000004000000a0140000b812000000000000b8120000b8120000243e283098b1150f37cb471e11b8120000d0130000d0130000d0130000d0130000d013000004000000", @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000043000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002811501100000000000000000000000000000000000000000000000030106367726f7570000000000000000000000000000000000000000000000001000101012e2f6367726f75702f73797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e5cf000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005cfdffff820c0000000000003000616800000000000000000000000000000000000000000000000000000000000004d2000004d60180000000020000280053594e50524f585900000000000000000000000000000000000000000000085500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000380168010000000000000000000000000000000000000000000000004800686268000000000000000000000000000000000000000000000000000000feffffff070103000100008004009e0e6c0a09000200ff0f00007d0afaff0300f2010000020004002800697076366865616465720000000000000000000000000000000000000000408301000000000030005345540000000000000000000000000000000000000000000000000000020100a600000007090e0800008a000000fe8000000000000000000000000000aafe8000000000000000000000000000aaff000000000000ffffffffffffffffffffffffffff00000000000000ffffffff64756d6d7930000000000000000000007465616d300000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff000000000000000000000000000000008d00cb0748000000000000000000000000000000f00018010000000000000000000000000000000000000000000000002800686c0000000000000000000000000000000000000000000000000000000000000000000000002800434c41535349465900000000000000000000000000000000000000000000ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000a587d1f37263577bfaa4526132a2fe24be3b88c8acd9ae91b88b5061c1cfb25d55"], 0x1500) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 668.050081] audit: type=1400 audit(1547651171.530:30379): avc: denied { write } for pid=26771 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 668.236357] audit: type=1400 audit(1547651171.630:30380): avc: denied { map } for pid=26781 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 668.393111] FAT-fs (loop4): bogus number of reserved sectors [ 668.450698] audit: type=1400 audit(1547651171.640:30381): avc: denied { map } for pid=26780 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 668.461307] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:12 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd", 0x1}], 0x1) 15:06:12 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) [ 668.690120] audit: type=1400 audit(1547651171.640:30382): avc: denied { map } for pid=26780 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 668.802203] FAT-fs (loop3): bogus number of reserved sectors [ 668.808041] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:12 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000240)={0x5, 0xef7, 0x2, 0xebd, 0x5}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/context\x00', 0x2, 0x0) ioctl$GIO_UNIMAP(r5, 0x4b66, &(0x7f00000001c0)={0x6, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}]}) [ 668.877001] audit: audit_backlog=65 > audit_backlog_limit=64 [ 668.892578] audit: type=1400 audit(1547651171.670:30383): avc: denied { map } for pid=26782 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 668.906542] audit: audit_backlog=65 > audit_backlog_limit=64 [ 668.932814] audit: audit_backlog=65 > audit_backlog_limit=64 [ 669.063496] FAT-fs (loop3): bogus number of reserved sectors [ 669.109347] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) socket$unix(0x1, 0x7, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:06:13 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x4) read(r2, &(0x7f0000000200)=""/191, 0xbf) readahead(r2, 0x5, 0x7) write$P9_RCLUNK(r2, 0x0, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000000c0)={0x4}) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000080)=""/39) 15:06:13 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd", 0x1}], 0x1) [ 669.568985] FAT-fs (loop4): bogus number of reserved sectors [ 669.613746] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:13 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r5 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9af}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x28}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r5, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:06:14 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) [ 670.398890] FAT-fs (loop3): bogus number of reserved sectors 15:06:14 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd", 0x1}], 0x1) [ 670.444538] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000240)={0x5, 0xef7, 0x2, 0xebd, 0x5}) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/context\x00', 0x2, 0x0) [ 670.594216] FAT-fs (loop3): bogus number of reserved sectors [ 670.651183] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:14 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "73f2be1a1449e36c6c4c3fa370ee8076c9dda3f3"}, 0x15, 0x2) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) 15:06:14 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000003c0), &(0x7f0000000540)=0x4) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in=@broadcast, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x20000, &(0x7f00000004c0)={[{@mode={'mode', 0x3d, 0x3ff}}], [{@euid_lt={'euid<', r4}}, {@euid_eq={'euid', 0x3d, r5}}, {@fsmagic={'fsmagic', 0x3d, 0xb6e}}]}) [ 671.315800] FAT-fs (loop4): bogus number of reserved sectors 15:06:15 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd4420f0776e294f414827a4e16b9afb8b44ce7f3f5ad0f56207c4d0d1fb34bd99e1db40a57f", 0x26}], 0x1) [ 671.374481] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:15 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 671.768017] FAT-fs (loop3): bogus number of reserved sectors [ 671.827075] FAT-fs (loop3): Can't find a valid FAT filesystem [ 671.969947] FAT-fs (loop3): bogus number of reserved sectors 15:06:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000240)={0x5, 0xef7, 0x2, 0xebd, 0x5}) [ 672.048963] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:16 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f00000000c0)={0x5, 0x2}) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') 15:06:16 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r5 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9af}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x28}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) sendmsg$nl_route(r5, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:06:16 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 15:06:16 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd44", 0x2}], 0x1) [ 672.581151] FAT-fs (loop4): bogus number of reserved sectors [ 672.617973] FAT-fs (loop4): Can't find a valid FAT filesystem [ 672.663885] kauditd_printk_skb: 401 callbacks suppressed [ 672.663894] audit: type=1400 audit(1547651176.560:30689): avc: denied { map } for pid=26904 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 672.852671] audit: type=1400 audit(1547651176.610:30690): avc: denied { map } for pid=26904 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 673.063385] audit: type=1400 audit(1547651176.610:30691): avc: denied { map } for pid=26905 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:17 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) 15:06:17 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd44", 0x2}], 0x1) 15:06:17 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 673.358237] audit: type=1400 audit(1547651176.610:30692): avc: denied { map } for pid=26905 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 673.396769] FAT-fs (loop3): bogus number of reserved sectors [ 673.435704] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.441762] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.464650] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.473026] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.476821] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.488400] FAT-fs (loop3): Can't find a valid FAT filesystem [ 673.498482] audit: audit_backlog=65 > audit_backlog_limit=64 [ 673.666561] FAT-fs (loop3): bogus number of reserved sectors [ 673.748777] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:17 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r1, 0x700, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xff}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x20000000) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000100)={0x7, 0x33, 0x2}, 0x7) fcntl$setlease(r2, 0x400, 0x1) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000040)={{0x2, 0x0, 0x5, 0x3, 0x8}, 0x1, 0xfffffffffffffbff, 0xffff}) read(r3, &(0x7f0000000200)=""/191, 0xbf) write$P9_RSETATTR(r2, &(0x7f0000000380)={0x7, 0x1b, 0x1}, 0x7) write$P9_RCLUNK(r3, 0x0, 0x0) 15:06:18 executing program 0: r0 = syz_genetlink_get_family_id$ipvs(0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) r2 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$packet(0x11, 0x2, 0x300) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r5, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f00000005c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0x6c, r0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9af}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x28}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1d}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) dup2(r4, r5) 15:06:18 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd44", 0x2}], 0x1) [ 674.373658] FAT-fs (loop4): bogus number of reserved sectors [ 674.428461] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:18 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x600102, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:06:18 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) 15:06:19 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{}], 0x1) 15:06:19 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000080)={0x40}, 0x4) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x80084, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r1, 0x0, 0x0) [ 675.698523] FAT-fs (loop3): bogus number of reserved sectors [ 675.777131] FAT-fs (loop3): Can't find a valid FAT filesystem [ 675.786566] FAT-fs (loop4): bogus number of reserved sectors [ 675.845337] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:20 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 676.278050] FAT-fs (loop3): bogus number of reserved sectors [ 676.323342] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:20 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = eventfd2(0x10001, 0x1) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/124, 0x7c}], 0x1, &(0x7f0000000240)=""/114, 0x72}, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:06:20 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) 15:06:20 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r5 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r3, r4) 15:06:20 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{}], 0x1) 15:06:20 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) [ 677.053593] FAT-fs (loop4): bogus number of reserved sectors [ 677.105154] FAT-fs (loop4): Can't find a valid FAT filesystem [ 677.113779] FAT-fs (loop3): bogus number of reserved sectors 15:06:21 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{}], 0x1) [ 677.159981] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) 15:06:21 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 677.615348] FAT-fs (loop3): bogus number of reserved sectors [ 677.662090] FAT-fs (loop3): Can't find a valid FAT filesystem [ 677.691945] kauditd_printk_skb: 447 callbacks suppressed [ 677.691954] audit: type=1400 audit(1547651181.590:31089): avc: denied { map } for pid=27049 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:21 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000780)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000a80)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000a40)={&(0x7f00000007c0)={0x1c, r1, 0x700, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4040000}, 0x4008814) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r3, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x1, &(0x7f0000000b80)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB=',smackfstransmute=ppp0ppp1eth1*!\x00,\x00']) connect$unix(r2, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000900)=[{&(0x7f0000000800)="ef7fc0ac23d099ce150b68e860e23bc148deef5e715cff9f4207ed4b652d323dde7f981ced2ae6d3851cad90facf46b373a98d94a705d0bf80db3e4d8f955f2de8a7a3b9a82b2c9a1423c82c1d6d20ff15c575d1b64d27d5c3cbac1b8614bf"}, {&(0x7f0000000240)="47c17168cec187b7db8870c703867eb3babfbe689a8b27f91e11e398a717dcdcf41c45348de5ebcd327ca76c9d25715fa4d36f4e98d658b833fa2c5de3ec108802bebb84abe08bc0e7b95f1e7e"}, {&(0x7f00000004c0)="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"}, {&(0x7f00000002c0)="6a50fd9ee5705c5721a7a2ba5ee2d439f6d18bfec9b046193b484f4fd2b95c7aec6925ae7cd3291d5d518bcf8f2c34d56535891603b76405e953367e7f971cbe8651cbe015b3ea09a969fdc4aa484dd9a8004187487781c078f375"}, {&(0x7f0000000a00)="ca85d67b2e23094a09f01edc33"}, {&(0x7f0000000980)="71746e0e2751568727b3cc0a416d5dc71333536104794b66c009bb4673bbd4fbfd5dbbd15dd65eca4d7063c90cf7f89907938524f91bdbf74ffd5330a3c19095c46c66111de4eb31350a4cf3f6fb7f14c42dc129adddb75bbeb24374ba537dc9f0ab0a287820"}, {&(0x7f0000000880)="1cfc278c4c967eb4da97e40d012683e04741aa3b40ca29eeaa98e8256512c820ac04457e608ad9a1d7256da91e00759a20a6942cd951bbbce4aa2aa8b2116f06b432e30efd2f1282626952edb1904a66643b6d13595932e879d03956e1866ae30ab814eb90cd323c2c51a6350a08f8659b8dbdbe1c4e63db62842d46880f86"}, {&(0x7f00000006c0)="76c990225ce229ae64d5cb77a9939cd9f8f3a029278a17c64304c0dda3085158a85592023b04463395a5f154cc1e3e1c745744cb6b74b2595b55cb5b6d8e38bedea42734c9efe2bd47ed2b8742db02b016adb46976d3000a910d4cf1fed0e5c78ad81848aae00b0068ffc163d3ddce50f4b7931df3c5082a5224e921d2b591b3918d8fa3690e6119e12f0ef6f6f826d7f4ebd1"}], 0x1000000000000134, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000b40)='TIPCv2\x00') ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) write$P9_RLOCK(r0, &(0x7f00000000c0)={0x8, 0x35, 0x2, 0x2}, 0x8) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 677.851091] audit: type=1400 audit(1547651181.610:31090): avc: denied { map } for pid=27049 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 678.017361] audit: type=1400 audit(1547651181.630:31091): avc: denied { map } for pid=27049 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:22 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000000)="cd", 0x1}], 0x1) 15:06:22 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r5 = socket$nl_route(0x10, 0x3, 0x0) pread64(r4, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r3, r4) [ 678.192189] audit: type=1400 audit(1547651181.680:31093): avc: denied { read } for pid=27026 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 678.381446] audit: type=1400 audit(1547651181.670:31092): avc: denied { map } for pid=27049 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 678.443472] FAT-fs (loop4): bogus number of reserved sectors [ 678.517281] FAT-fs (loop4): Can't find a valid FAT filesystem [ 678.580200] audit: type=1400 audit(1547651181.730:31094): avc: denied { map } for pid=27049 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:22 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) fstat(r0, &(0x7f0000000040)) [ 678.749920] audit: type=1400 audit(1547651181.730:31095): avc: denied { map } for pid=27049 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 678.897166] audit: audit_backlog=65 > audit_backlog_limit=64 [ 678.928390] audit: audit_backlog=65 > audit_backlog_limit=64 [ 678.947844] audit: audit_backlog=65 > audit_backlog_limit=64 [ 678.961211] FAT-fs (loop3): bogus number of reserved sectors 15:06:22 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 679.037467] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:23 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{}], 0x1) [ 679.455248] FAT-fs (loop3): bogus number of reserved sectors [ 679.514627] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:24 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r3, r4) [ 680.256793] SELinux: security_context_str_to_sid(system_u) failed for (dev bpf, type bpf) errno=-22 [ 680.374963] FAT-fs (loop4): bogus number of reserved sectors [ 680.418161] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:24 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{}], 0x1) 15:06:24 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) read(0xffffffffffffffff, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x0) 15:06:24 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) 15:06:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/42, 0x2a) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffff9c, 0x40086602, 0x0) 15:06:25 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x40002, 0x0) writev(r0, &(0x7f0000000480)=[{}], 0x1) [ 681.890061] FAT-fs (loop4): bogus number of reserved sectors [ 681.895928] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:26 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@remote, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e24, 0x6, 0x4e23, 0x4, 0xa, 0x80, 0x80, 0x3e, r1, r2}, {0x7, 0x400, 0x5, 0x2, 0x10000, 0x44df, 0x400, 0x3}, {0x6, 0xfffffffffffffc01, 0x3, 0x3f}, 0xfffffffffffffff8, 0x6e6bb8, 0x1, 0x0, 0x1}, {{@in6=@loopback, 0x4d3}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x15}, 0x3507, 0x2, 0x3, 0x0, 0x2, 0x8, 0x5}}, 0xe8) read(r0, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) 15:06:26 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000005040)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000005140)=0xe8) [ 682.141603] FAT-fs (loop3): bogus number of reserved sectors [ 682.193795] FAT-fs (loop3): Can't find a valid FAT filesystem [ 682.312396] FAT-fs (loop3): bogus number of reserved sectors [ 682.418491] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, 0x0) 15:06:26 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:26 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$packet(0x11, 0x2, 0x300) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r4, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r3, r4) [ 682.715652] kauditd_printk_skb: 356 callbacks suppressed [ 682.715660] audit: type=1400 audit(1547651186.610:31425): avc: denied { map } for pid=27166 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.862221] FAT-fs (loop4): bogus number of reserved sectors [ 682.896843] audit: type=1400 audit(1547651186.620:31426): avc: denied { map } for pid=27160 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 682.924205] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 683.086574] audit: type=1400 audit(1547651186.620:31427): avc: denied { map } for pid=27166 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 683.263424] audit: type=1400 audit(1547651186.620:31428): avc: denied { map } for pid=27164 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 683.425841] FAT-fs (loop3): bogus number of reserved sectors [ 683.436783] FAT-fs (loop1): bogus number of reserved sectors 15:06:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e80)={{{@in=@local, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@dev}}, &(0x7f0000000f80)=0xe8) [ 683.486118] FAT-fs (loop3): Can't find a valid FAT filesystem [ 683.494407] FAT-fs (loop1): Can't find a valid FAT filesystem [ 683.496935] audit: type=1400 audit(1547651186.620:31429): avc: denied { map } for pid=27160 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:27 executing program 2: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000080)=[{}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) syz_genetlink_get_family_id$ipvs(0x0) fchmodat(r0, &(0x7f0000000180)='./file0\x00', 0x1) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r1, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r1, 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) [ 683.699889] FAT-fs (loop3): bogus number of reserved sectors [ 683.766048] FAT-fs (loop3): Can't find a valid FAT filesystem [ 683.777591] audit: type=1400 audit(1547651186.620:31430): avc: denied { map } for pid=27164 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:27 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') r2 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x80, 0x0) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000600)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="08012abd7000fcdbdf25050000006daf20", @ANYRES32=r2, @ANYBLOB="0c000500210100000000000008000100000000000c0005002200000040080000"], 0x48}, 0x1, 0x0, 0x0, 0x4008800}, 0x4000) readlink(&(0x7f0000000500)='./file0\x00', 0xffffffffffffffff, 0x9fc6886d418576b0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r5, 0x0, 0x0) connect$unix(r4, 0x0, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x32, &(0x7f0000000640)=""/131, &(0x7f0000000300)=0x83) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000280)='nodevvmnet1eth0wlan0GPLem1\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000240)="315d42cb768ffdc5e291e2caac80014e", 0x10) write$selinux_create(r3, &(0x7f0000000140)=@access={'system_u:object_r:tty_device_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x200}, 0x46) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000002c0)) pread64(r6, &(0x7f0000000700)=""/214, 0xd6, 0x15) ioctl$LOOP_CTL_ADD(r6, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 683.988622] audit: audit_backlog=65 > audit_backlog_limit=64 [ 683.991458] audit: audit_backlog=65 > audit_backlog_limit=64 [ 684.014895] audit: audit_backlog=65 > audit_backlog_limit=64 [ 684.023447] audit: audit_backlog=65 > audit_backlog_limit=64 [ 684.182059] FAT-fs (loop4): bogus number of reserved sectors [ 684.223748] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:28 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:28 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r3, 0xffffffffffffffff) [ 684.940090] FAT-fs (loop1): bogus number of reserved sectors [ 685.012577] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:28 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f00000000c0)=""/191, 0xbf) write$P9_RCLUNK(r0, 0x0, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x80000) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000080)) [ 685.119322] FAT-fs (loop4): bogus number of reserved sectors [ 685.160387] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 685.200695] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:29 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:29 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 685.790087] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:06:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x2, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) accept4$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c, 0x800) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f00000000c0)) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) getsockname(r1, &(0x7f0000000200)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_mreq(r0, 0x29, 0x1d, &(0x7f00000002c0)={@dev={0xfe, 0x80, [], 0x1f}, r2}, 0x14) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 686.304634] FAT-fs (loop4): bogus number of reserved sectors [ 686.363271] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:30 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000300)={@local, 0x0}, &(0x7f0000000340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000480)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@remote, @in=@loopback, 0x4e23, 0x100, 0x4e20, 0x0, 0x2, 0x80, 0xa0, 0x32, r1, r2}, {0xffffffff, 0x7, 0x53, 0x100000001, 0x0, 0x678, 0x8, 0x401}, {0x1cf9, 0x7, 0x9, 0x1}, 0x7fffffff, 0x0, 0x1, 0x1, 0x3, 0x3}, {{@in6=@mcast2, 0x4d5, 0xff}, 0x2, @in6=@local, 0x0, 0x4, 0x0, 0x3ff, 0x6c, 0x0, 0x6}}, 0xe8) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r3, &(0x7f0000000200)=""/191, 0xbf) write$P9_RCLUNK(r3, 0x0, 0x0) 15:06:30 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r3) 15:06:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) sendfile(r1, r4, 0x0, 0x8000fffffffe) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:30 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 687.366101] FAT-fs (loop1): bogus number of reserved sectors [ 687.389677] FAT-fs (loop1): Can't find a valid FAT filesystem [ 687.471844] FAT-fs (loop3): bogus number of reserved sectors 15:06:31 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) [ 687.515323] FAT-fs (loop3): Can't find a valid FAT filesystem [ 687.660104] FAT-fs (loop3): bogus number of reserved sectors [ 687.721611] FAT-fs (loop3): Can't find a valid FAT filesystem [ 687.749123] kauditd_printk_skb: 375 callbacks suppressed [ 687.749131] audit: type=1400 audit(1547651191.640:31798): avc: denied { create } for pid=27297 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:06:31 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) timer_create(0x4, &(0x7f00000000c0)={0x0, 0x36, 0x1}, &(0x7f0000000140)=0x0) timer_gettime(r0, &(0x7f0000000180)) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r3, 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x98, r4, 0x24, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x60c1082f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) connect$unix(r2, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r5, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) utime(&(0x7f00000005c0)='./file2\x00', &(0x7f0000000600)={0xe0, 0x4734}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) readlink(&(0x7f00000004c0)='./file1\x00', &(0x7f0000000500)=""/190, 0xbe) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 687.980540] audit: type=1400 audit(1547651191.680:31799): avc: denied { write } for pid=27297 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 688.131963] FAT-fs (loop4): bogus number of reserved sectors [ 688.204570] FAT-fs (loop4): Can't find a valid FAT filesystem [ 688.232557] audit: type=1400 audit(1547651191.700:31800): avc: denied { create } for pid=27298 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:06:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 688.450862] audit: type=1400 audit(1547651191.720:31801): avc: denied { write } for pid=27298 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:06:32 executing program 2: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 688.647801] audit: type=1400 audit(1547651191.780:31802): avc: denied { create } for pid=27297 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:06:32 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) ftruncate(r4, 0x2007fff) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 688.746943] audit: audit_backlog=65 > audit_backlog_limit=64 [ 688.752879] FAT-fs (loop1): bogus number of reserved sectors [ 688.754471] audit: audit_backlog=65 > audit_backlog_limit=64 [ 688.758685] FAT-fs (loop1): Can't find a valid FAT filesystem [ 688.760756] audit: audit_backlog=65 > audit_backlog_limit=64 [ 688.785293] audit: audit_backlog=66 > audit_backlog_limit=64 [ 688.802155] audit: audit_lost=955 audit_rate_limit=0 audit_backlog_limit=64 15:06:32 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r3) 15:06:33 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) [ 689.450593] FAT-fs (loop3): bogus number of reserved sectors [ 689.498221] FAT-fs (loop3): Can't find a valid FAT filesystem [ 689.508850] FAT-fs (loop4): bogus number of reserved sectors [ 689.518705] FAT-fs (loop2): bogus number of reserved sectors [ 689.560281] FAT-fs (loop4): Can't find a valid FAT filesystem [ 689.579868] FAT-fs (loop2): Can't find a valid FAT filesystem 15:06:34 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) open(&(0x7f0000000400)='./bus\x00', 0x1141042, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:34 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r3) 15:06:34 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x4000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0xfffffee2) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f0000000140)={'filter\x00', 0xe8, "2263ee437db03b7382c881c59ad7590f0cd845153f4bc2f79938fcdf1e6a0fc864248ebf5c2225f94344a96cbbf1d3ba4138b8c9fc2bacee31ba6f3dfa8e6b348cea7f3c579573079df5269beef792959b8ffab2e06d05f7e267929297e0a80ad0cca2df7f7db1154011f02391edda766666fe634b075d7f159951f3d1b97f5d09fa42f26d5474283d86da01821f5537b1f5c82031dc5baa78f9d3641532a9ede2ffd59388ddee1a7945d3bfa1fa9629c4032ab0696cd77b6e7ed6a26a13ea109d9a603973805211210024fcfcd1c97605ab19a7914aaa4e4c52b38b56093348845c04b28a4a8c91"}, &(0x7f0000000280)=0x10c) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) fsync(r2) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:06:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 691.024026] FAT-fs (loop1): bogus number of reserved sectors [ 691.090113] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:35 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) r2 = socket$unix(0x1, 0x801, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) connect(r2, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 691.839275] FAT-fs (loop4): bogus number of reserved sectors [ 691.842188] FAT-fs (loop3): bogus number of reserved sectors [ 691.858349] FAT-fs (loop2): bogus number of reserved sectors 15:06:35 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) [ 691.926580] FAT-fs (loop2): Can't find a valid FAT filesystem [ 691.927343] FAT-fs (loop4): Can't find a valid FAT filesystem [ 691.948814] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:36 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) 15:06:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:36 executing program 2: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 692.514262] FAT-fs (loop3): bogus number of reserved sectors [ 692.540705] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:36 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:initctl_t:s0\x00', 0x1f, 0x2) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) [ 692.913466] FAT-fs (loop1): bogus number of reserved sectors [ 692.919334] FAT-fs (loop1): Can't find a valid FAT filesystem [ 692.988124] kauditd_printk_skb: 360 callbacks suppressed [ 692.988134] audit: type=1400 audit(1547651196.880:32126): avc: denied { create } for pid=27426 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 693.243423] audit: type=1400 audit(1547651196.940:32127): avc: denied { write } for pid=27426 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:06:37 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 693.502907] audit: type=1400 audit(1547651196.960:32128): avc: denied { syslog } for pid=27423 comm="syz-executor5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 693.731351] audit: type=1400 audit(1547651197.020:32129): avc: denied { create } for pid=27426 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 693.829684] audit: audit_backlog=66 > audit_backlog_limit=64 [ 693.832924] audit: audit_backlog=66 > audit_backlog_limit=64 15:06:37 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) [ 693.870193] FAT-fs (loop2): bogus number of reserved sectors [ 693.876218] FAT-fs (loop4): bogus number of reserved sectors [ 693.892176] FAT-fs (loop3): bogus number of reserved sectors [ 693.899079] audit: audit_backlog=66 > audit_backlog_limit=64 [ 693.912181] FAT-fs (loop2): Can't find a valid FAT filesystem 15:06:37 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 693.926721] FAT-fs (loop4): Can't find a valid FAT filesystem [ 693.956398] FAT-fs (loop3): Can't find a valid FAT filesystem [ 693.960968] audit: type=1400 audit(1547651197.020:32130): avc: denied { write } for pid=27426 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 693.962995] audit: audit_lost=969 audit_rate_limit=0 audit_backlog_limit=64 [ 693.986547] audit: audit_lost=970 audit_rate_limit=0 audit_backlog_limit=64 15:06:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:38 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) [ 694.186344] FAT-fs (loop3): bogus number of reserved sectors [ 694.231185] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:38 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x490c0458b79e7ab2) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="56f080470a923f9f30c9065c6d585f31", 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:06:38 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$unix(0x1, 0x801, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 694.807599] FAT-fs (loop1): bogus number of reserved sectors [ 694.867907] FAT-fs (loop1): Can't find a valid FAT filesystem [ 695.542027] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:06:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:39 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 695.605656] FAT-fs (loop3): bogus number of reserved sectors [ 695.685450] FAT-fs (loop3): Can't find a valid FAT filesystem [ 695.813771] FAT-fs (loop3): bogus number of reserved sectors [ 695.849407] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='pids.events\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e22, 0x1000, @rand_addr="908fc439333b10b486281755d1f100f9", 0x5}, {0xa, 0x4e24, 0x7fff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0xb6, [0x10000, 0xffff, 0x29c3, 0x2, 0x8, 0x6, 0xfffffffffffffffa, 0x4]}, 0x5c) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000001600)='/dev/null\x00', 0x0, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x19) bind$unix(r3, 0x0, 0x0) connect$unix(r2, 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) openat(r1, &(0x7f00000000c0)='./file0\x00', 0x1, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000100)={'nr0\x00', {0x2, 0x4e23, @multicast2}}) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 15:06:39 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) 15:06:40 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) 15:06:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$unix(0x1, 0x801, 0x0) socket$unix(0x1, 0x1, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 696.361555] FAT-fs (loop4): bogus number of reserved sectors [ 696.416799] FAT-fs (loop4): Can't find a valid FAT filesystem [ 696.760500] FAT-fs (loop1): bogus number of reserved sectors [ 696.766552] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:40 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) socket$unix(0x1, 0x801, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 697.231738] FAT-fs (loop3): bogus number of reserved sectors [ 697.237593] FAT-fs (loop3): Can't find a valid FAT filesystem [ 697.495778] FAT-fs (loop3): bogus number of reserved sectors [ 697.567212] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:41 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:41 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) 15:06:41 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) [ 698.017971] kauditd_printk_skb: 379 callbacks suppressed [ 698.017980] audit: type=1400 audit(1547651201.910:32479): avc: denied { map } for pid=27574 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.221361] audit: type=1400 audit(1547651201.940:32480): avc: denied { syslog } for pid=27575 comm="syz-executor5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 698.228901] FAT-fs (loop4): bogus number of reserved sectors 15:06:42 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 698.342675] FAT-fs (loop1): bogus number of reserved sectors [ 698.348517] FAT-fs (loop1): Can't find a valid FAT filesystem [ 698.416204] audit: type=1400 audit(1547651201.960:32481): avc: denied { map } for pid=27574 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.470185] FAT-fs (loop4): Can't find a valid FAT filesystem [ 698.591217] audit: type=1400 audit(1547651202.010:32482): avc: denied { map } for pid=27574 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 698.771802] audit: type=1400 audit(1547651202.030:32483): avc: denied { map } for pid=27574 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 698.831807] audit: audit_backlog=65 > audit_backlog_limit=64 [ 698.833817] audit: audit_backlog=65 > audit_backlog_limit=64 [ 698.842026] audit: audit_backlog=65 > audit_backlog_limit=64 [ 698.846656] audit: audit_backlog=65 > audit_backlog_limit=64 [ 698.858259] audit: audit_backlog=65 > audit_backlog_limit=64 [ 699.191051] FAT-fs (loop3): bogus number of reserved sectors [ 699.196904] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:43 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) 15:06:43 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x401000000001, 0x0) close(r1) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:43 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) 15:06:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:44 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 700.178485] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:06:44 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x401000000001, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:45 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 701.087324] FAT-fs (loop1): bogus number of reserved sectors [ 701.160065] FAT-fs (loop1): Can't find a valid FAT filesystem [ 701.174778] FAT-fs (loop3): bogus number of reserved sectors [ 701.230108] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:45 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 701.430404] FAT-fs (loop4): bogus number of reserved sectors [ 701.462451] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:45 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:45 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) 15:06:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 702.217960] FAT-fs (loop1): bogus number of reserved sectors [ 702.264643] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:46 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 702.655984] FAT-fs (loop3): bogus number of reserved sectors [ 702.716785] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 703.028009] kauditd_printk_skb: 427 callbacks suppressed [ 703.028018] audit: type=1400 audit(1547651206.920:32853): avc: denied { map } for pid=27710 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 703.076762] FAT-fs (loop4): bogus number of reserved sectors [ 703.135513] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:47 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 703.275026] audit: type=1400 audit(1547651206.950:32854): avc: denied { map } for pid=27714 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 703.279213] FAT-fs (loop1): bogus number of reserved sectors 15:06:47 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 703.487686] FAT-fs (loop1): Can't find a valid FAT filesystem [ 703.494527] audit: type=1400 audit(1547651206.960:32855): avc: denied { map } for pid=27714 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 703.675339] audit: type=1400 audit(1547651206.960:32856): avc: denied { map } for pid=27710 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:47 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) [ 703.936220] audit: type=1400 audit(1547651207.010:32857): avc: denied { map } for pid=27714 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 703.971398] audit: audit_backlog=65 > audit_backlog_limit=64 [ 703.982626] audit: audit_backlog=65 > audit_backlog_limit=64 [ 703.983057] audit: audit_backlog=65 > audit_backlog_limit=64 [ 704.017294] audit: audit_lost=1002 audit_rate_limit=0 audit_backlog_limit=64 [ 704.019394] audit: audit_backlog=65 > audit_backlog_limit=64 [ 704.138652] FAT-fs (loop3): bogus number of reserved sectors [ 704.200882] FAT-fs (loop3): Can't find a valid FAT filesystem [ 704.272786] FAT-fs (loop4): bogus number of reserved sectors [ 704.330137] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:48 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 704.680446] FAT-fs (loop1): bogus number of reserved sectors [ 704.716978] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:48 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:06:49 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) 15:06:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 705.640071] FAT-fs (loop3): bogus number of reserved sectors [ 705.645929] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:49 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 705.960623] FAT-fs (loop4): bogus number of reserved sectors 15:06:49 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 706.009062] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:50 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 706.415803] FAT-fs (loop1): bogus number of reserved sectors [ 706.478286] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:50 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 706.816771] FAT-fs (loop3): bogus number of reserved sectors [ 706.849532] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:51 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:06:51 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) [ 707.611826] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:06:51 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) 15:06:51 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 708.049495] kauditd_printk_skb: 359 callbacks suppressed [ 708.049505] audit: type=1400 audit(1547651211.940:33195): avc: denied { map } for pid=27847 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.090924] FAT-fs (loop1): bogus number of reserved sectors [ 708.155256] FAT-fs (loop1): Can't find a valid FAT filesystem [ 708.277500] audit: type=1400 audit(1547651211.990:33197): avc: denied { map } for pid=27847 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.496145] audit: type=1400 audit(1547651212.000:33198): avc: denied { map } for pid=27848 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 708.664366] audit: type=1400 audit(1547651212.010:33199): avc: denied { map } for pid=27851 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 708.751535] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.752310] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.765170] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.765539] audit: audit_backlog=65 > audit_backlog_limit=64 [ 708.781689] audit: audit_lost=1011 audit_rate_limit=0 audit_backlog_limit=64 15:06:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 708.796470] audit: audit_lost=1012 audit_rate_limit=0 audit_backlog_limit=64 15:06:52 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$packet(0x11, 0x2, 0x300) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r3, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r2, r3) 15:06:52 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 709.081823] FAT-fs (loop3): bogus number of reserved sectors [ 709.086469] FAT-fs (loop4): bogus number of reserved sectors [ 709.093861] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:53 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) [ 709.142522] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:53 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 709.623280] FAT-fs (loop1): bogus number of reserved sectors [ 709.668708] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:53 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 710.002928] FAT-fs (loop4): bogus number of reserved sectors [ 710.071981] FAT-fs (loop4): Can't find a valid FAT filesystem 15:06:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:54 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 710.600565] FAT-fs (loop3): bogus number of reserved sectors 15:06:54 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 710.656867] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:54 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 710.720993] FAT-fs (loop1): bogus number of reserved sectors 15:06:54 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) [ 710.773239] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:55 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 711.420100] FAT-fs (loop4): bogus number of reserved sectors [ 711.464507] FAT-fs (loop4): Can't find a valid FAT filesystem [ 711.670654] FAT-fs (loop3): bogus number of reserved sectors [ 711.698454] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:55 executing program 0: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:06:55 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:06:56 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:56 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 712.228380] FAT-fs (loop1): bogus number of reserved sectors 15:06:56 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 712.300381] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:56 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:56 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 713.063494] FAT-fs (loop4): bogus number of reserved sectors [ 713.077104] kauditd_printk_skb: 380 callbacks suppressed [ 713.077113] audit: type=1400 audit(1547651216.970:33573): avc: denied { map } for pid=27985 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 713.144155] FAT-fs (loop4): Can't find a valid FAT filesystem [ 713.285134] audit: type=1400 audit(1547651217.010:33574): avc: denied { map } for pid=27978 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 713.439759] audit: type=1400 audit(1547651217.010:33575): avc: denied { map } for pid=27985 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:06:57 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 713.588946] audit: audit_backlog=65 > audit_backlog_limit=64 [ 713.590551] audit: audit_backlog=65 > audit_backlog_limit=64 [ 713.598794] audit: type=1400 audit(1547651217.020:33576): avc: denied { map } for pid=27986 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 713.620069] audit: audit_lost=1015 audit_rate_limit=0 audit_backlog_limit=64 15:06:57 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 713.631015] audit: audit_lost=1016 audit_rate_limit=0 audit_backlog_limit=64 [ 713.640379] audit: backlog limit exceeded [ 713.643865] audit: backlog limit exceeded 15:06:57 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 713.788973] FAT-fs (loop3): bogus number of reserved sectors [ 713.797858] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:57 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 714.039869] print_req_error: I/O error, dev loop1, sector 0 [ 714.045745] FAT-fs (loop1): unable to read boot sector 15:06:58 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:58 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 714.675559] FAT-fs (loop4): bogus number of reserved sectors [ 714.745886] FAT-fs (loop4): Can't find a valid FAT filesystem [ 714.891336] FAT-fs (loop3): bogus number of reserved sectors [ 714.953219] FAT-fs (loop3): Can't find a valid FAT filesystem 15:06:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:59 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x40002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 715.150205] FAT-fs (loop1): bogus number of reserved sectors [ 715.174416] FAT-fs (loop1): Can't find a valid FAT filesystem 15:06:59 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:06:59 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:06:59 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:06:59 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:00 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 716.209691] FAT-fs (loop4): bogus number of reserved sectors [ 716.260411] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:00 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:00 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x48000808}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:00 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 717.091052] FAT-fs (loop3): bogus number of reserved sectors [ 717.092609] FAT-fs (loop1): bogus number of reserved sectors [ 717.118165] FAT-fs (loop3): Can't find a valid FAT filesystem [ 717.142596] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:01 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:01 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:01 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 717.738793] FAT-fs (loop4): bogus number of reserved sectors [ 717.803942] FAT-fs (loop4): Can't find a valid FAT filesystem [ 718.089121] kauditd_printk_skb: 344 callbacks suppressed [ 718.089130] audit: type=1400 audit(1547651221.980:33909): avc: denied { map } for pid=28121 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:02 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:02 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x800) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 718.270698] audit: type=1400 audit(1547651221.990:33910): avc: denied { map } for pid=28119 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.395073] audit: type=1400 audit(1547651222.020:33911): avc: denied { syslog } for pid=28120 comm="syz-executor5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 15:07:02 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 718.485489] audit: type=1400 audit(1547651222.020:33912): avc: denied { read } for pid=28100 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 718.510803] audit: type=1400 audit(1547651222.050:33913): avc: denied { map } for pid=28126 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.533897] audit: type=1400 audit(1547651222.050:33914): avc: denied { map } for pid=28119 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.558693] audit: type=1400 audit(1547651222.050:33915): avc: denied { map } for pid=28127 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.580981] audit: type=1400 audit(1547651222.050:33916): avc: denied { map } for pid=28121 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.605595] audit: type=1400 audit(1547651222.060:33917): avc: denied { map } for pid=28127 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.627861] audit: type=1400 audit(1547651222.060:33918): avc: denied { map } for pid=28121 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 718.729507] FAT-fs (loop1): bogus number of reserved sectors [ 718.731024] FAT-fs (loop3): bogus number of reserved sectors [ 718.781032] FAT-fs (loop1): Can't find a valid FAT filesystem [ 718.820115] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:02 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:02 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 719.138174] FAT-fs (loop4): bogus number of reserved sectors [ 719.177203] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) 15:07:03 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:03 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'ip_vti0\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:03 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 720.202747] FAT-fs (loop3): bogus number of reserved sectors [ 720.233855] FAT-fs (loop1): bogus number of reserved sectors 15:07:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 720.275922] FAT-fs (loop3): Can't find a valid FAT filesystem [ 720.284693] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:04 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:04 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 720.900515] FAT-fs (loop4): bogus number of reserved sectors [ 720.967727] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:05 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 721.261722] FAT-fs (loop1): bogus number of reserved sectors 15:07:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syslog(0x0, 0xffffffffffffffff, 0xffffffffffffff2c) [ 721.336345] FAT-fs (loop3): bogus number of reserved sectors [ 721.353642] FAT-fs (loop1): Can't find a valid FAT filesystem [ 721.413205] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:05 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:05 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@remote, @in=@initdev}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:05 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:05 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 722.093737] FAT-fs (loop4): bogus number of reserved sectors 15:07:06 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 722.137073] FAT-fs (loop4): Can't find a valid FAT filesystem [ 722.482747] FAT-fs (loop1): bogus number of reserved sectors [ 722.513997] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:06 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) accept4(0xffffffffffffff9c, &(0x7f00000003c0)=@hci, 0x0, 0x80000) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:06 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:06 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 722.922800] FAT-fs (loop3): bogus number of reserved sectors [ 722.952016] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:06 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:06 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 723.101809] kauditd_printk_skb: 347 callbacks suppressed [ 723.101819] audit: type=1400 audit(1547651227.000:34266): avc: denied { map } for pid=28254 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 723.496796] audit: type=1400 audit(1547651227.390:34267): avc: denied { create } for pid=28259 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 723.599381] FAT-fs (loop1): bogus number of reserved sectors [ 723.668195] FAT-fs (loop1): Can't find a valid FAT filesystem [ 723.715311] audit: type=1400 audit(1547651227.440:34268): avc: denied { write } for pid=28259 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 723.723410] FAT-fs (loop4): bogus number of reserved sectors 15:07:07 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 723.948620] FAT-fs (loop4): Can't find a valid FAT filesystem [ 723.952455] audit: type=1400 audit(1547651227.520:34269): avc: denied { create } for pid=28259 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 724.136555] FAT-fs (loop3): bogus number of reserved sectors [ 724.162767] FAT-fs (loop3): Can't find a valid FAT filesystem [ 724.186852] audit: type=1400 audit(1547651227.540:34270): avc: denied { write } for pid=28259 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 15:07:08 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:08 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 724.269521] audit: audit_backlog=65 > audit_backlog_limit=64 [ 724.271979] audit: audit_backlog=65 > audit_backlog_limit=64 [ 724.277140] audit: audit_backlog=65 > audit_backlog_limit=64 [ 724.286008] audit: audit_backlog=65 > audit_backlog_limit=64 [ 724.288618] audit: audit_backlog=65 > audit_backlog_limit=64 15:07:08 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:08 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) 15:07:08 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 724.779770] FAT-fs (loop1): bogus number of reserved sectors [ 724.816878] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:08 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 725.357807] FAT-fs (loop4): bogus number of reserved sectors [ 725.416055] FAT-fs (loop3): bogus number of reserved sectors [ 725.423103] FAT-fs (loop4): Can't find a valid FAT filesystem [ 725.498415] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:09 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:09 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:09 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:09 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:09 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 725.920781] FAT-fs (loop1): bogus number of reserved sectors [ 725.926630] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:10 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:10 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:10 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) socket(0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 726.856983] FAT-fs (loop4): bogus number of reserved sectors [ 726.885475] FAT-fs (loop3): bogus number of reserved sectors [ 726.911480] FAT-fs (loop4): Can't find a valid FAT filesystem [ 726.930258] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:10 executing program 5: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:11 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:11 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:11 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 727.704263] FAT-fs (loop1): bogus number of reserved sectors [ 727.719009] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:11 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:11 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 727.980062] FAT-fs (loop5): bogus number of reserved sectors [ 727.986007] FAT-fs (loop5): Can't find a valid FAT filesystem [ 728.196539] FAT-fs (loop4): bogus number of reserved sectors [ 728.229005] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:12 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 728.378135] kauditd_printk_skb: 338 callbacks suppressed [ 728.378144] audit: type=1400 audit(1547651232.270:34566): avc: denied { create } for pid=28398 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 728.571085] audit: type=1400 audit(1547651232.290:34567): avc: denied { write } for pid=28398 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 728.729261] audit: type=1400 audit(1547651232.400:34568): avc: denied { map } for pid=28406 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:12 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) read(r0, &(0x7f0000000200)=""/191, 0xbf) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 728.893992] audit: type=1400 audit(1547651232.410:34569): avc: denied { map } for pid=28406 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 728.961029] audit: type=1400 audit(1547651232.430:34570): avc: denied { map } for pid=28406 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:12 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:12 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 729.039745] audit: audit_backlog=65 > audit_backlog_limit=64 [ 729.065524] audit: audit_backlog=65 > audit_backlog_limit=64 [ 729.066877] audit: audit_lost=1037 audit_rate_limit=0 audit_backlog_limit=64 [ 729.084801] audit: audit_lost=1038 audit_rate_limit=0 audit_backlog_limit=64 [ 729.095085] audit: backlog limit exceeded [ 729.182056] FAT-fs (loop3): bogus number of reserved sectors [ 729.187895] FAT-fs (loop3): Can't find a valid FAT filesystem [ 729.192141] FAT-fs (loop1): bogus number of reserved sectors [ 729.199690] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:13 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:13 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 729.551400] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:07:13 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x40002, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:14 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 730.345527] FAT-fs (loop1): bogus number of reserved sectors [ 730.354858] FAT-fs (loop3): bogus number of reserved sectors 15:07:14 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:14 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x0, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 730.411036] FAT-fs (loop1): Can't find a valid FAT filesystem [ 730.424401] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:14 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:14 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 731.004869] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:07:15 executing program 2: syz_genetlink_get_family_id$ipvs(0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:15 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:15 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 732.271799] FAT-fs (loop3): bogus number of reserved sectors [ 732.277657] FAT-fs (loop3): Can't find a valid FAT filesystem [ 732.283628] FAT-fs (loop1): bogus number of reserved sectors [ 732.289434] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:16 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:16 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 732.659575] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:07:16 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 732.823183] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:07:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:17 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 733.381949] kauditd_printk_skb: 290 callbacks suppressed [ 733.381958] audit: type=1400 audit(1547651237.280:34860): avc: denied { map } for pid=28530 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.466550] audit: type=1400 audit(1547651237.280:34861): avc: denied { map } for pid=28533 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:17 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 733.603703] audit: type=1400 audit(1547651237.280:34862): avc: denied { map } for pid=28533 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:17 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 733.659687] audit: type=1400 audit(1547651237.280:34863): avc: denied { map } for pid=28530 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.684387] audit: type=1400 audit(1547651237.280:34864): avc: denied { map } for pid=28530 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.719972] audit: type=1400 audit(1547651237.280:34865): avc: denied { map } for pid=28533 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 733.786690] FAT-fs (loop1): bogus number of reserved sectors [ 733.792735] FAT-fs (loop3): bogus number of reserved sectors [ 733.822104] FAT-fs (loop3): Can't find a valid FAT filesystem [ 733.828270] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:17 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 733.883664] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 15:07:17 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 733.970480] audit: type=1400 audit(1547651237.280:34866): avc: denied { map } for pid=28533 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 734.125277] audit: type=1400 audit(1547651237.340:34867): avc: denied { map } for pid=28532 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 734.271598] audit: type=1400 audit(1547651237.340:34868): avc: denied { map } for pid=28532 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:18 executing program 2: socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 734.409719] audit: type=1400 audit(1547651237.340:34869): avc: denied { map } for pid=28532 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:18 executing program 5: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:18 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:19 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 735.134841] FAT-fs (loop1): bogus number of reserved sectors [ 735.196677] FAT-fs (loop1): Can't find a valid FAT filesystem [ 735.372824] FAT-fs (loop3): bogus number of reserved sectors [ 735.387759] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:19 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 15:07:19 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:19 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:19 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 736.192803] FAT-fs (loop5): bogus number of reserved sectors [ 736.231715] FAT-fs (loop5): Can't find a valid FAT filesystem 15:07:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 736.377182] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:07:20 executing program 5: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:20 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 15:07:20 executing program 4: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 737.043848] FAT-fs (loop1): bogus number of reserved sectors [ 737.047281] FAT-fs (loop3): bogus number of reserved sectors [ 737.066449] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:21 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, 0x0, 0x0) connect$unix(r0, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 737.118710] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:21 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:21 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 737.540848] FAT-fs (loop5): bogus number of reserved sectors [ 737.595361] FAT-fs (loop5): Can't find a valid FAT filesystem 15:07:21 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:21 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 738.395429] kauditd_printk_skb: 247 callbacks suppressed [ 738.395438] audit: type=1400 audit(1547651242.290:35117): avc: denied { map } for pid=28660 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.452235] FAT-fs (loop1): bogus number of reserved sectors [ 738.458405] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:22 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 738.506902] audit: type=1400 audit(1547651242.290:35118): avc: denied { map } for pid=28660 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.599388] audit: type=1400 audit(1547651242.310:35119): avc: denied { map } for pid=28660 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 738.698122] audit: type=1400 audit(1547651242.320:35120): avc: denied { map } for pid=28660 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:22 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:22 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 738.771486] FAT-fs (loop3): bogus number of reserved sectors [ 738.794980] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:22 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 15:07:22 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 738.917289] audit: type=1400 audit(1547651242.320:35121): avc: denied { map } for pid=28660 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 739.065836] audit: type=1400 audit(1547651242.340:35122): avc: denied { map } for pid=28660 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:23 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 739.230431] audit: type=1400 audit(1547651242.380:35123): avc: denied { map } for pid=28661 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 739.391026] audit: type=1400 audit(1547651242.380:35124): avc: denied { map } for pid=28661 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 739.511925] FAT-fs (loop1): bogus number of reserved sectors [ 739.568026] FAT-fs (loop1): Can't find a valid FAT filesystem [ 739.593674] audit: type=1400 audit(1547651242.390:35125): avc: denied { map } for pid=28661 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 739.637400] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:07:23 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 739.778413] audit: type=1400 audit(1547651242.400:35126): avc: denied { map } for pid=28661 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 739.900486] FAT-fs (loop3): bogus number of reserved sectors 15:07:23 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 739.943240] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:23 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:24 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:24 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) [ 740.806810] FAT-fs (loop1): bogus number of reserved sectors [ 740.834602] FAT-fs (loop3): bogus number of reserved sectors [ 740.868567] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 740.873788] FAT-fs (loop1): Can't find a valid FAT filesystem [ 740.905921] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:24 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:24 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, 0x0, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:07:25 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:25 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:25 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) [ 742.221874] FAT-fs (loop3): bogus number of reserved sectors [ 742.282611] FAT-fs (loop3): Can't find a valid FAT filesystem [ 742.330136] FAT-fs (loop1): bogus number of reserved sectors [ 742.358940] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 15:07:26 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 742.412592] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:26 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, 0x0, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 15:07:26 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:26 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:27 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 743.408352] kauditd_printk_skb: 234 callbacks suppressed [ 743.408362] audit: type=1400 audit(1547651247.300:35361): avc: denied { map } for pid=28768 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:27 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 743.561012] FAT-fs (loop3): bogus number of reserved sectors [ 743.566863] FAT-fs (loop3): Can't find a valid FAT filesystem [ 743.690071] audit: type=1400 audit(1547651247.310:35362): avc: denied { map } for pid=28768 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 743.805974] FAT-fs (loop4): bogus number of reserved sectors [ 743.833848] FAT-fs (loop4): Can't find a valid FAT filesystem [ 743.925228] audit: type=1400 audit(1547651247.820:35363): avc: denied { map } for pid=28794 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 744.025859] audit: type=1400 audit(1547651247.820:35364): avc: denied { map } for pid=28794 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:28 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 744.072152] FAT-fs (loop1): bogus number of reserved sectors [ 744.078082] FAT-fs (loop1): Can't find a valid FAT filesystem [ 744.213018] audit: type=1400 audit(1547651247.820:35365): avc: denied { map } for pid=28795 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:28 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:28 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) [ 744.322944] audit: type=1400 audit(1547651247.850:35366): avc: denied { map } for pid=28795 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 744.387386] audit: type=1400 audit(1547651247.850:35367): avc: denied { map } for pid=28794 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 744.432239] audit: type=1400 audit(1547651247.850:35368): avc: denied { map } for pid=28794 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 744.456395] audit: type=1400 audit(1547651247.850:35369): avc: denied { map } for pid=28797 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:28 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 744.571091] audit: type=1400 audit(1547651247.860:35370): avc: denied { map } for pid=28792 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:28 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:28 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 745.078806] FAT-fs (loop3): bogus number of reserved sectors [ 745.127648] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:29 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:29 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 745.838447] FAT-fs (loop4): bogus number of reserved sectors [ 745.859083] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:29 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 745.889933] FAT-fs (loop1): bogus number of reserved sectors [ 745.918232] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:29 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:29 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, 0x0, 0x0) dup2(r1, r2) [ 746.160059] FAT-fs (loop3): bogus number of reserved sectors [ 746.165907] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:30 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 15:07:30 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:30 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 746.990245] FAT-fs (loop4): bogus number of reserved sectors [ 746.996136] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:31 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 747.301006] FAT-fs (loop1): bogus number of reserved sectors [ 747.333651] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:31 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 15:07:31 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 747.745363] FAT-fs (loop3): bogus number of reserved sectors [ 747.787898] FAT-fs (loop3): Can't find a valid FAT filesystem [ 747.832480] FAT-fs (loop4): bogus number of reserved sectors [ 747.881555] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:31 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:31 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:32 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f}, 0x20}}, 0x0) 15:07:32 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 748.413948] kauditd_printk_skb: 246 callbacks suppressed [ 748.413956] audit: type=1400 audit(1547651252.310:35617): avc: denied { map } for pid=28894 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:32 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 748.611233] audit: type=1400 audit(1547651252.370:35618): avc: denied { map } for pid=28894 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 748.720530] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 748.741876] audit: type=1400 audit(1547651252.390:35619): avc: denied { map } for pid=28894 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:32 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 748.932180] audit: type=1400 audit(1547651252.400:35620): avc: denied { map } for pid=28894 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 749.082640] FAT-fs (loop3): bogus number of reserved sectors [ 749.090177] audit: type=1400 audit(1547651252.460:35621): avc: denied { map } for pid=28894 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 749.117254] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:33 executing program 2: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 749.193171] FAT-fs (loop4): bogus number of reserved sectors [ 749.259335] FAT-fs (loop4): Can't find a valid FAT filesystem [ 749.274355] audit: type=1400 audit(1547651252.460:35622): avc: denied { map } for pid=28894 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:33 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:33 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 749.456617] audit: type=1400 audit(1547651253.220:35623): avc: denied { map } for pid=28916 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:33 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) dup2(r1, r2) 15:07:33 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 749.680485] audit: type=1400 audit(1547651253.230:35624): avc: denied { map } for pid=28916 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 749.710069] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 749.807774] audit: type=1400 audit(1547651253.250:35625): avc: denied { map } for pid=28917 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 749.940083] FAT-fs (loop2): bogus number of reserved sectors 15:07:33 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 750.001287] FAT-fs (loop2): Can't find a valid FAT filesystem [ 750.010072] audit: type=1400 audit(1547651253.260:35626): avc: denied { map } for pid=28916 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 750.217059] FAT-fs (loop3): bogus number of reserved sectors [ 750.267657] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:34 executing program 2: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:34 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:34 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 751.003547] FAT-fs (loop4): bogus number of reserved sectors [ 751.040086] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:35 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:35 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) dup2(r1, r2) [ 751.375911] FAT-fs (loop2): bogus number of reserved sectors [ 751.434647] FAT-fs (loop2): Can't find a valid FAT filesystem [ 751.443040] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 15:07:35 executing program 2: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:35 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:36 executing program 1: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 752.333920] FAT-fs (loop3): bogus number of reserved sectors [ 752.346257] FAT-fs (loop4): bogus number of reserved sectors [ 752.359208] FAT-fs (loop3): Can't find a valid FAT filesystem [ 752.390115] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:36 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:36 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 752.850890] FAT-fs (loop2): bogus number of reserved sectors [ 752.904045] FAT-fs (loop2): Can't find a valid FAT filesystem [ 753.420258] kauditd_printk_skb: 222 callbacks suppressed [ 753.420267] audit: type=1400 audit(1547651257.320:35849): avc: denied { map } for pid=29009 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:37 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:37 executing program 1: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:37 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 753.533125] audit: type=1400 audit(1547651257.320:35850): avc: denied { map } for pid=29012 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.670684] audit: type=1400 audit(1547651257.320:35851): avc: denied { map } for pid=29009 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.751069] audit: type=1400 audit(1547651257.340:35852): avc: denied { map } for pid=29012 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.775967] audit: type=1400 audit(1547651257.350:35853): avc: denied { map } for pid=29009 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.802100] audit: type=1400 audit(1547651257.360:35854): avc: denied { map } for pid=29012 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.826957] audit: type=1400 audit(1547651257.370:35855): avc: denied { map } for pid=29009 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.854556] audit: type=1400 audit(1547651257.420:35856): avc: denied { map } for pid=29017 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 753.877715] audit: type=1400 audit(1547651257.430:35857): avc: denied { map } for pid=29017 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:37 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:37 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 753.951621] FAT-fs (loop4): bogus number of reserved sectors [ 753.983588] FAT-fs (loop4): Can't find a valid FAT filesystem [ 754.068430] audit: type=1400 audit(1547651257.470:35858): avc: denied { map } for pid=29009 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:38 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:39 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:39 executing program 1: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:39 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, r2) 15:07:39 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 755.461657] FAT-fs (loop4): bogus number of reserved sectors [ 755.486952] FAT-fs (loop4): Can't find a valid FAT filesystem [ 755.487239] FAT-fs (loop3): bogus number of reserved sectors 15:07:39 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 755.581561] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:39 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:40 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:40 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:40 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) dup2(r1, r2) 15:07:40 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 756.999168] FAT-fs (loop4): bogus number of reserved sectors [ 756.999592] FAT-fs (loop3): bogus number of reserved sectors [ 757.006332] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:41 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 757.068532] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:41 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 757.542272] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 15:07:41 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 757.798197] FAT-fs (loop4): bogus number of reserved sectors [ 757.843806] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:42 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:42 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:42 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(0xffffffffffffffff, r1) [ 758.460167] FAT-fs (loop3): bogus number of reserved sectors 15:07:42 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 758.500904] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:42 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 758.974832] EXT4-fs (loop1): VFS: Can't find ext4 filesystem [ 759.078753] FAT-fs (loop4): bogus number of reserved sectors [ 759.107836] FAT-fs (loop4): Can't find a valid FAT filesystem [ 759.173011] FAT-fs (loop3): bogus number of reserved sectors [ 759.209757] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 759.250238] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:43 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 759.310478] kauditd_printk_skb: 257 callbacks suppressed [ 759.310487] audit: type=1400 audit(1547651263.210:36116): avc: denied { map } for pid=29146 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 759.456562] audit: type=1400 audit(1547651263.210:36117): avc: denied { map } for pid=29147 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:43 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 759.577316] audit: type=1400 audit(1547651263.240:36118): avc: denied { map } for pid=29147 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 759.628650] audit: type=1400 audit(1547651263.240:36119): avc: denied { map } for pid=29145 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:43 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000480)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r1, 0xffffffffffffffff) 15:07:43 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 759.657684] audit: type=1400 audit(1547651263.240:36120): avc: denied { map } for pid=29146 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 759.685884] audit: type=1400 audit(1547651263.250:36121): avc: denied { map } for pid=29145 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 759.789679] audit: type=1400 audit(1547651263.250:36122): avc: denied { map } for pid=29147 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 759.831855] audit: type=1400 audit(1547651263.270:36123): avc: denied { map } for pid=29147 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:43 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:43 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, &(0x7f0000000380), 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 760.011205] audit: type=1400 audit(1547651263.270:36124): avc: denied { map } for pid=29146 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.153572] audit: type=1400 audit(1547651263.270:36125): avc: denied { map } for pid=29145 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 760.480929] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 15:07:44 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 761.010813] FAT-fs (loop4): bogus number of reserved sectors [ 761.052461] FAT-fs (loop3): bogus number of reserved sectors [ 761.065494] FAT-fs (loop4): Can't find a valid FAT filesystem [ 761.097176] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:45 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, &(0x7f0000000380), 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:45 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:45 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:45 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 761.653442] FAT-fs (loop1): bogus number of reserved sectors [ 761.689149] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:46 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:46 executing program 0: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:46 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:46 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 762.618750] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 762.627787] FAT-fs (loop4): bogus number of reserved sectors [ 762.634979] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:46 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, &(0x7f0000000380), 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 762.969032] FAT-fs (loop1): bogus number of reserved sectors [ 763.005624] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:47 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 763.240211] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 15:07:47 executing program 0: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 763.530090] EXT4-fs (loop3): VFS: Can't find ext4 filesystem [ 763.545786] FAT-fs (loop4): bogus number of reserved sectors [ 763.601452] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:47 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:47 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 764.106015] FAT-fs (loop1): bogus number of reserved sectors [ 764.146202] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:48 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{0x0}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:48 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 764.503439] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:07:48 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 764.576636] kauditd_printk_skb: 249 callbacks suppressed [ 764.576645] audit: type=1400 audit(1547651268.470:36375): avc: denied { map } for pid=29260 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 764.637593] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 15:07:48 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 764.780339] audit: type=1400 audit(1547651268.480:36376): avc: denied { map } for pid=29260 comm="getty" path="/sbin/getty" dev="sda1" ino=16170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:48 executing program 0: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 764.933322] FAT-fs (loop4): bogus number of reserved sectors [ 764.958275] audit: type=1400 audit(1547651268.500:36377): avc: denied { map } for pid=29260 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 765.000556] FAT-fs (loop4): Can't find a valid FAT filesystem [ 765.130319] audit: type=1400 audit(1547651268.500:36378): avc: denied { map } for pid=29260 comm="getty" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 765.332922] audit: type=1400 audit(1547651268.580:36379): avc: denied { map } for pid=29260 comm="getty" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 765.464512] audit: type=1400 audit(1547651268.650:36380): avc: denied { map } for pid=29260 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:49 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 765.552639] audit: type=1400 audit(1547651268.650:36381): avc: denied { map } for pid=29260 comm="getty" path="/lib/x86_64-linux-gnu/libutil-2.13.so" dev="sda1" ino=2681 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:49 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 765.709753] FAT-fs (loop1): bogus number of reserved sectors [ 765.728881] audit: type=1400 audit(1547651268.710:36382): avc: denied { map } for pid=29260 comm="getty" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:49 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{0x0}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 765.759547] FAT-fs (loop1): Can't find a valid FAT filesystem [ 765.784353] audit: audit_backlog=65 > audit_backlog_limit=64 [ 765.794170] audit: audit_backlog=65 > audit_backlog_limit=64 15:07:49 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:50 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 766.373139] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 15:07:50 executing program 5: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 766.548626] FAT-fs (loop4): bogus number of reserved sectors [ 766.600692] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:50 executing program 0: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:50 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:51 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:51 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{0x0}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 767.334185] FAT-fs (loop1): bogus number of reserved sectors [ 767.378873] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:51 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', 0x0, 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 767.677421] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:07:51 executing program 3: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:51 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 767.980525] FAT-fs (loop4): bogus number of reserved sectors [ 768.044219] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:52 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:52 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00'}) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:52 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 768.804620] FAT-fs (loop1): bogus number of reserved sectors [ 768.871583] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:52 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:53 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:53 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:53 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 769.504447] FAT-fs (loop4): bogus number of reserved sectors [ 769.566131] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:53 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 769.686119] kauditd_printk_skb: 261 callbacks suppressed [ 769.686128] audit: type=1400 audit(1547651273.580:36619): avc: denied { map } for pid=29390 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:53 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 769.819682] FAT-fs (loop1): bogus number of reserved sectors [ 769.889235] FAT-fs (loop1): Can't find a valid FAT filesystem [ 769.891470] audit: type=1400 audit(1547651273.590:36620): avc: denied { map } for pid=29390 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 770.080129] audit: type=1400 audit(1547651273.610:36621): avc: denied { map } for pid=29390 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 770.184629] audit: type=1400 audit(1547651273.620:36622): avc: denied { map } for pid=29390 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:54 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:54 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 770.269141] audit: type=1400 audit(1547651273.690:36623): avc: denied { map } for pid=29390 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 770.357931] audit: type=1400 audit(1547651273.740:36624): avc: denied { map } for pid=29390 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:54 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:54 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 770.570075] audit: type=1400 audit(1547651273.750:36625): avc: denied { map } for pid=29390 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 770.730757] audit: type=1400 audit(1547651273.750:36626): avc: denied { map } for pid=29392 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 770.856832] audit: type=1400 audit(1547651273.770:36627): avc: denied { map } for pid=29396 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 770.992158] FAT-fs (loop4): bogus number of reserved sectors 15:07:55 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 771.045383] FAT-fs (loop4): Can't find a valid FAT filesystem [ 771.072695] audit: type=1400 audit(1547651273.770:36628): avc: denied { map } for pid=29392 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 15:07:55 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 771.346585] FAT-fs (loop1): bogus number of reserved sectors [ 771.374903] FAT-fs (loop1): Can't find a valid FAT filesystem [ 771.382865] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 15:07:55 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:55 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:55 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:55 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:55 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 772.024780] FAT-fs (loop4): bogus number of reserved sectors [ 772.074171] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:56 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:56 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:56 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a", 0x1c}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:57 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 773.126784] FAT-fs (loop1): bogus number of reserved sectors [ 773.136087] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:57 executing program 0: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:57 executing program 1: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:57 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 773.667330] FAT-fs (loop4): bogus number of reserved sectors [ 773.735968] FAT-fs (loop4): Can't find a valid FAT filesystem 15:07:57 executing program 2: openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x8000000000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 773.930188] FAT-fs (loop3): bogus number of reserved sectors [ 773.936129] FAT-fs (loop3): Can't find a valid FAT filesystem 15:07:58 executing program 5: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 15:07:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a", 0x1c}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, 0x0, 0x0) connect$unix(r1, 0x0, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) 15:07:58 executing program 3: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 774.655462] FAT-fs (loop1): bogus number of reserved sectors [ 774.675233] FAT-fs (loop1): Can't find a valid FAT filesystem 15:07:58 executing program 0: syz_mount_image$msdos(&(0x7f0000000480)='msdos\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000380)=[{&(0x7f0000000340)="a6197997ee6c8fe9031919df423caa186df13059a6d890d3c883a73a111cd1b993312545fa19fbd34fe9dbb1a1cabb08f6a7bcf49ea702", 0x37}], 0x10, 0x0) readlink(&(0x7f0000000400)='./file0\x00', 0xffffffffffffffff, 0xfffffffffffffd20) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x800000000000, 0x0) request_key(&(0x7f0000000440)='encrypted\x00', &(0x7f0000001680)={'syz', 0x2}, &(0x7f00000016c0)='ppp0ppp1eth1*!\x00', 0xfffffffffffffffc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000001640), 0x1000000000000104, 0x4000) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x1, 0xffffffffffff1621, 0x5, 0x55, 0x0, 0xffff, 0x402, 0x4, 0x1, 0x3, 0x5, 0xe58, 0x10000, 0x8, 0xeb, 0x7f, 0x7, 0x9, 0x2, 0x2, 0x1, 0x4, 0x0, 0x7ff, 0xa3, 0x6, 0x8, 0xa3, 0x7, 0x2, 0x0, 0x7f, 0x80000001, 0x9, 0x0, 0x57f, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x20024, 0x6, 0x4, 0x6, 0x1, 0x4, 0x5}, r0, 0xf, r0, 0x4) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) [ 774.710749] kasan: CONFIG_KASAN_INLINE enabled [ 774.719167] kasan: GPF could be caused by NULL-ptr deref or user memory access