91e3b9a114012a7aca903741e32ce77c04a58eba5c46c10005ff57244613f43c98723b9540395fa275bb2a3d62523c833ac4592d5bd853521f99ec4b55e42aa8c46ac0f7c192046307a25a33e9f0f81de4f674ef00a419736bf7e85fdbfed29a57ea6d57c8cce72d58e9e4ac5fc759afd1fb3fc8fe17311bbffc77375b1cee850d7a129ac940aa20b97faf9544d6dddce01b0079ce86916557fec790cde177cb9fb998a06b0adcff6d26bb7b039a62b97887e196e9eccfe2d1c3eafffd73ff70b7b84a84a7a1c4e98b74cd3107592b91c3659420252add72b5c6e1c76753bddb221807ea19d2b153a05305388e28685f819bb635310b14b50c5ca92600a0386681c3c5af560abe4b684cd948fe5bd92f332d02708583a0b9cb404cd12ce0492054b938194d732a716a1986c7e997fcaf023e67a74d2e7a16d5c7eab0cede004bad6b4081c1aab96d2e19c7430ca9598927d378a9fb0b35ae35ceaab9104163281fbe92c5907865a47336a0957ab9521ad7fa6c2133d46ba0067712521f5d5036f2ceaf6d169d0a41a726e1966a9772a6d043792f2ee4e2b69b47ac0cb1cc20a6d005323d136d98ed069076ab4dbf8c7ecfc96fca57a3fc40cd9ba06a8103efeea747a17a57036250531f6c7e32d5c3f255618ffe6194427c6a115386bdf79b64e8287d9f96360791e349846546b986a54e673089480d72c4ab8a195f55e25a8454ae8de92a60903f2a11ac3e5096efcc32d42d43e9584794b364db7d18a4b2c5a8e0358ec6d9e43c166c0a1bc64d37931831bd130644f332e07ef977397dd7f9150422f6d7bae1efb63c177b72a4679b7bb7f4bcb27864e133e31542e3f005fb6cd1849cbb2585f03e7d009dd607bd67cdae68ef0c51786b93da5ae6a97ee5fa8d138fbc5a9386e15b30a474a45be08b0b4bebfb3579ff29db9372377a95404701913b3ab13347fa58e57b95fda9ea159d44f442e12cd0f4e4fef042aa2049e4592d1138873ed1452ab2480021dab3b1d9d710af91881f224cda56c78b115ad16c67fc593f0bb50bec19a6a86d9bd47b7ff8923c2637ab6f90baea4256ce75165ee717ab84250cefeb57052cf9b89bd31c363577d5ea5371f3150199a2501797747d58c4f5ae31c3098095e2c63436762b4d106aa9944ca9f30823617f741869ab101bd6f5b798a385f5a7779f91cd5994cb4953f1fc6fee3c5f62281bbb0af95f41575ac760b3dd2e1d2c13aecd2f49187f521a106bdf41307b4e3d7e1f38021105c7a66236c2e2751a92448ea62de828f4badcead4aa6cb935f17352a4978df65bddbd95fed71d3392d67ed0d41e682a8a4b2645f6e18db8f39e9bd750c1f9c4300a84bb46c1443b85846b0c0c3b21deb54e550cf2eee7cc3d14576d8211a6707934274c9bd9c6493e60c16f0db83b14e5972b3e21b25043981658649e32a470b235b599bf14b1f0075637f1d33d34efbea17f5f7065da7b8bc18620d997331acda09c7b384aa6916f83346f76526d09046bca69381aabd45d1753ea51991e9e98dcb690a1363fe3777d7a1b061956d0eba963d4787c443daf550d59fa26220822b473c4922b9a0fe89db2cefb773dcd7c9540a31ef57732098a34b85182c8395dfe18f40497f5bd3a97147ab5a24043de18cdfb6569b3517e91cbb2569f32fc4beb8287dcc45098d0b17417ca401335fb1880260ad01af058e5ba6ee6df8b49bf17064bcbe71ffac99174a384c89fa83d2f16d633a2652e967c3dd9e1f6c8356e71a8e893d43a1870b1b8b34e1d2cf26c6469a13bb5b569bb75eb56af44c9dc4020586e861c1b35cf2e14024ea3dfe964f516e27ab3f9b0e059f0584bc7866200e738be20c5908cb39bf360e49b611a2b7d42249a5a8780e8371e55ca57bed4f55daad61e3406b58b0574ffbedd091730d4f2fe4c00c6eaddb9c438902c683df8872d88d15867ab32cc4eb5f5dd32584d9a9a6e28042eaf01724012e692fbbb26418aeee4d1fef7d7fc5068eed7ae0559b8a7bd40ae8b0dd0ac1688832f5d606fa51e859418ffa908e6316d8fb0340e45afed7ee7baf0b00af8cd2f22b39f549d45dff0d9d80e281c6c94778e3fe80a9bc937622b1d279b38f70f93db96e9956fe3914da916278fb0db0ad3f7da1fbce04b5c8d82f08d7009e4046d4acc0378c019fa688858f958303a56cf65077f541776664f4003d51ed46af574d448781fe3f9b05da3ceef8f355b560c937da64ba065f43b9d0891dda11af975728b0bda4e52b9de0e60a3c5e1a9962c1df56ca47c209bcc987e87aecbd36a1322535dbb4ce66eb202fdf0de3105bba765d50c26ef77d6adeebbc3e36cc8fd285d38e80008ea05c2a8ce959e3245e1c665539bf016e0aab30980b65c0f2bd6b2020d7646e2105948e37081f27b4ac71ca1e9f04919c38986f1d846aefe06403b83a1c856c2b9747faa81cae95dbdb7b89660811bf9dde8eee6510a17b25114e60a567945f8b4bd3bfa20ca62324d61c5462bdab7be2ddef6b75c7796118c9d51733ac66b9872c32941e3995e217e0bcead5df1fe8150300538a359424dfa993d9ef0412e7b1dc222366ffe9ea0590e8a3d63e0a54efacfe40018ed860b732547f35bb304bd594e880fd721028f59ce37829f8d684eb803f593b3ca6f3bdcf04570e7c1bcc4c48f11e8a3b456ccefd5b8b7023cc2b063c8e9760caee138316e076eec371d1e282607738f38878f6029d1b3ce43137d4b0ea02d304f8dc5509bac1e2428915db1b6c8f710363161841b858f0b14a72be50ea559ba5b6fbc3f8357391a27f8d0375c6adf6973896b4ccc3608c60a15e15d179c83d930cc5b9dd0ae5b921bb75d74ccddc0e548d20402ba03cdb86bc30e9071fdda852eab1e48d5f4e4939c4a6cccb3631fa705708c52ea1d11a7491c1b85f1bae442a39456fe9d2e824cb29f44614119dd46cb75bed272277d86faece7a28ffd4f5e0b3795bfecea2117094088d048690a37989e5106572d121308a35019d6d1889d572af693c7190396185d8249108c4e9d1c0a99829c654ce03be9332b13cf15cdc288b1c254ba012f1220bc70c17ca8659be43c9e3df1750537d7731253c310055cd99278d5ac6ccf98817627290d00c0f631276b7cb9a18ac8a4c1e98e4f377ebf0214db974de8dcc6619d9aa701a34a888c7577d6e92c45410760a6e53b16a35ce0426875197ef0c612fff72fb06b296773124d6435f1f7822297f837d65e8741580deac4bc01340f4dd367e9556e6c8799f5d56587dee4eca60df643b54b56460386cc8e6dced9fe1bc58ff59c3caf2c01521eb7338f1358bc7d3d50376ae76e8dc6d3b87c7df6ccf3a1a4de8a1e09c03d85077523160bdeb77e67d6ffc571ddba2afe67da67e88ea116133318c511fb88a8f26274770594a9adb24e592f97ef5a0522c02b559e0eb706f55d4a3f145c62e1c05c821de1d4612b7c64c19585eb976761d6315d3819e530c19a53aa4107ec3360b0684bfa27e7397a2cccc0db20220e27a0ed9173378d6940fb66f2ebd58be1fa844e50259f86c566741d1e523bc0cdd37f45d553525f2f96be58ba5f2adc406c4a38d7b214336e0e974cf0baa73cc3bde9726a2a88dfe45ec12ee694c8a2dc296043c725db2b32e20d330fb9cc33d9793c9e91f6ddbced6a51231ebeefb14043029733d8ffef68dd1c89657d7b879f22bd02c59acab6213a0b211cb3c9629070d78624d9b9cb941392b90f3cb4de866afc69c6b2464b8421dae6a6caf25a0d051b8971b0f49a2717de275b78b642774620f4b12994d91aeedc1b9ffb0d9e2c775a3da2508af65986f29c983a4bf222ceba7da917325d3173e56f092e244cadbe9ef84455db69ff079312f0f16c0e700a79c3fe5447aa205a066b69dcd5b9b4aa9cfddddd5c7ab88d100124b574975e46a4957d72465bf786e31c72aa36685f0bd4f44b0d3ad5618359de5e1738cd552618b6f870338a6a971ba80de6ebdea830679b0d22cf5ac962adf8ada596ed7e637749209d8768b5d9e3a08d984631abb06268e3d30e4e63d29567c66baf2229c55c7187f9fbefd6889d87a2dce08dc50368aefa57cd62be691059b85e0bc74d553cd8ba24279d237d69011586d6aaa3ebe2db4ea3585431d7e7164cfcce79269b72da637fccca1a2ca41ac6777a08613e89b01819e602066b1646f30e88d461e4f3c8247f442c9b380100a65867c0f9a7f1c08977deb0c51863aae0d6e84f3b1598f6e0d306f18d32106834fc7a1500e27ef0c9830de56c6ea336034936daec74c5e29bec84637015c75f1581285657bad8c27741d371d86c5878a25e31adda353d222c64f26b970be6f41f65f36c3e159e54a120577d048763ec733e18f9f6492df90e44b038abb4d9a0d4733188d7f2a1d76ec0244cdf39f701f2b96914152af637bc46322dd5122b5fb6e137ff9e63fe3433ac3d59ee6dd58e325a19a43bbe75d2c98337a1c17f87f6ee80f0d7f0bda903fe855f6a7f20b078cae1caa023e08a74c22c6045be82faf5d52cbe1ebc3922a6b3535f35a736a6198831ff193b1e415f4ae2d0074c019c32fabc611945396b28a1ee3ad8303de1104d5b26fe3bf601c882cfb362e2900f1a75d330f554469f0aa7e56d3e095b597be0eb3ef15b21e7302a5e6c18d4388a433110e7535236b2784316d2edfa62a26f8961835b25023871e9b9af14e5bdcb61a6d6aaef6c693d8187f7cef1732a2ed7f58b747366b7d99cb8e8da77c71af2cdb948f7cd9483470bd66abf78b5cbc5fe66590a9fcf8c882f49b51c1bd3b25669ac3921b81ffa1f3144f71b93a13ef08976efae9d25a71af6b4772697e10a05d3751e28b1e4934982f598ddf1047f6835ac756e6f4b6806c99185fe054462d13e110123765086497e57c07ac41853eab151745ed7d418babaa0af3325be34be58f678cfc41ca3bd3ba718558e605c5b44810683be7e8212155cd98b6e55a93f06a71405dada1ec1507beb23e53ac9a64c17344c6780d721028a74af775abd662fe35af3903fd4d1ff5a00606283fa8f8d41b9e54938560ed6e787337e160b6358b7f1327cf326d2b1f9b86a642d5968ac388f25d5f4f5601e548ef94c23839253c47f907555e5a8932fb6de46e67a40f606e023d4326a75d2e85ace2f8e7d1aeb8f8eaf624a984f0f612d26e4883c2af8c7edd6fbfd5d1c3ba63762a2af88230fff6a5beca2b40bcc170be43b2f44e689118e082efb129c47c7b5c179b5de104cb8de0e4661fd4f7599b5d2cd3f3b64c3f77a2538a156ce05b489fe4fe643b3a1a29973ed4bc25"}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f0000001c80)={{r0}, r8, 0x0, @unused=[0x6, 0xe7d0, 0x7fffffff, 0x80000000], @devid=r4}) pipe(&(0x7f00000000c0)) (async) fcntl$dupfd(r0, 0x0, r0) (async) write$binfmt_script(r2, &(0x7f0000000ac0)={'#! ', './file0', [{0x20, '\x00'}, {0x20, '\x00'}, {}, {0x20, '}/\\\xce\x00'}, {}, {}], 0xa, "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"}, 0x1018) (async) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @mcast1, 0x9}, 0x1c) (async) fcntl$setpipe(r1, 0x407, 0x20fffff) (async) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) (async) write(r1, &(0x7f0000000100)='=', 0x1) (async) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000001b00)) (async) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000000280)={0x3, 0x0, {0x4, @usage=0xdb, 0x0, 0xab, 0x6, 0x9, 0x5, 0x1f, 0x80, @usage, 0x3703, 0xffffffff, [0x9, 0xaa, 0x1, 0xa5, 0x3, 0x9]}, {0xffffffffffff702a, @usage=0x2acebc54, 0x0, 0x80000001, 0x4, 0x2, 0x0, 0xb4e, 0x10, @struct={0x7, 0x9}, 0x101, 0xd8d, [0x20, 0x125c, 0x80000001, 0xfef3, 0x3ff, 0x8]}, {0xc8c, @usage=0x3, 0x0, 0x40000000000000, 0x9, 0x2, 0x5, 0x1, 0x33, @usage=0x1, 0x6, 0x10001, [0x381a, 0x1, 0xcef5, 0x4, 0x7ff, 0x7]}, {0x8, 0x4, 0x4}}) (async) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000680)={r3, 0x9e, 0x0, [0xffffffff, 0x5, 0x7, 0x4, 0xfffffffffffffffc], [0x81, 0x3f4, 0x7, 0xffff, 0xfffffffffffffffc, 0x0, 0x7, 0x7, 0x1, 0xff, 0x103, 0x8000, 0xdcd2, 0x2, 0x401, 0x4, 0xfffffffffffffffa, 0x9, 0x3, 0x1f, 0x2, 0x3, 0xe5, 0x8001, 0x2, 0x100000000, 0xf118, 0xfffffffffffffffe, 0x1, 0x101, 0x7f, 0xc1b, 0x0, 0x3, 0x278045a, 0x7, 0x84a8, 0x1, 0x5, 0x6, 0x1000, 0x81, 0x1ff, 0xfffffffffffff410, 0xfad, 0x4, 0x1f, 0x5, 0x7fff, 0x0, 0xff, 0x80000000, 0x8001, 0x2, 0xf8c, 0xe6f, 0x1, 0x8001, 0x7, 0x4, 0x80000000, 0x20, 0xffffffff, 0x9ae, 0xda2, 0x0, 0x40, 0xfffffffffffffffb, 0x7fffffff, 0x9, 0x10000, 0x4, 0x1, 0x4, 0x7f, 0x5ef, 0xfffffffffffffffc, 0x8, 0x1, 0x5, 0x80000000, 0xa6, 0x6, 0xffffffff, 0x100, 0x6, 0x8, 0xb60, 0x6, 0xfffffffffffffe04, 0x2, 0x80000000, 0x8, 0x2, 0x7, 0x7f, 0x7, 0x80000000, 0x7ff, 0x2bb, 0x2000000000, 0x7, 0x0, 0x1, 0xffffffffffff7fff, 0x4, 0x0, 0x6, 0x0, 0x9, 0x9, 0x5, 0x499703c7, 0x37d5, 0x64, 0x2, 0x8, 0x10001, 0x1, 0x9, 0x6]}) (async) inotify_init1(0x800) (async) syz_open_dev$vcsu(&(0x7f0000000000), 0x2, 0x214001) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r6, 0xc0189372, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0x7fffffff}}, './file0\x00'}) (async) fcntl$setown(r5, 0x8, 0xffffffffffffffff) (async) fcntl$getownex(r5, 0x10, &(0x7f0000000080)) (async) openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) syz_genetlink_get_family_id$wireguard(&(0x7f0000000180), 0xffffffffffffffff) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r7, 0x81f8943c, &(0x7f0000001840)) (async) [ 262.746707][T16154] FAT-fs (loop5): Directory bread(block 1993) failed [ 262.755526][T16143] FAT-fs (loop3): Directory bread(block 1993) failed [ 262.770211][T16154] FAT-fs (loop5): Directory bread(block 1994) failed [ 262.774050][T16143] FAT-fs (loop3): Directory bread(block 1994) failed [ 262.782039][T16190] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 262.785520][T16143] FAT-fs (loop3): Directory bread(block 1995) failed [ 262.794045][T16154] FAT-fs (loop5): Directory bread(block 1995) failed ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(0xffffffffffffffff, 0x50009418, &(0x7f0000004780)={{}, r8, 0x0, @inherit={0x50, &(0x7f0000001780)=ANY=[@ANYBLOB="01000000000000000100000000000000020000000000000006000000000000002800000000000000dd0700000000000007000000000000000200000000000000060000000000000003000000000000004a43a6d26daa298b85e83c2a231d695917f40975ef18887f880d5f74c0be6a508ce924c61c3b75e52fd35b52"]}, @name="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"}) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r5, 0x50009418, &(0x7f0000001c80)={{r0}, r8, 0x0, @unused=[0x6, 0xe7d0, 0x7fffffff, 0x80000000], @devid=r4}) (async) 05:14:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x10020000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x11000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) 05:14:47 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:47 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x12000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 262.864667][T16200] loop3: detected capacity change from 0 to 64 [ 262.904652][T16207] loop4: detected capacity change from 0 to 64 05:14:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x18000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 262.915978][T16210] loop5: detected capacity change from 0 to 64 [ 262.942782][ T6611] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 05:14:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x20000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 262.969636][T16200] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 262.969670][T16210] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 262.972388][T16207] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 262.980289][T16234] loop1: detected capacity change from 0 to 64 [ 263.010966][T16210] FAT-fs (loop5): Directory bread(block 1986) failed 05:14:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x25000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 263.015909][ T6611] Buffer I/O error on dev loop1, logical block 0, async page read [ 263.028869][T16210] FAT-fs (loop5): Directory bread(block 1987) failed [ 263.031815][ T6611] Buffer I/O error on dev loop1, logical block 0, async page read [ 263.042982][T16210] FAT-fs (loop5): Directory bread(block 1988) failed [ 263.060275][T16234] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 263.066190][T16200] FAT-fs (loop3): Directory bread(block 1986) failed [ 263.075341][T16210] FAT-fs (loop5): Directory bread(block 1989) failed [ 263.086442][T16207] FAT-fs (loop4): Directory bread(block 1986) failed [ 263.101561][T16210] FAT-fs (loop5): Directory bread(block 1990) failed [ 263.111517][T16207] FAT-fs (loop4): Directory bread(block 1987) failed [ 263.113939][T16200] FAT-fs (loop3): Directory bread(block 1987) failed [ 263.122819][T16234] FAT-fs (loop1): Directory bread(block 1986) failed [ 263.129075][T16200] FAT-fs (loop3): Directory bread(block 1988) failed [ 263.133857][T16210] FAT-fs (loop5): Directory bread(block 1991) failed [ 263.139706][T16200] FAT-fs (loop3): Directory bread(block 1989) failed [ 263.146533][T16207] FAT-fs (loop4): Directory bread(block 1988) failed [ 263.154758][T16234] FAT-fs (loop1): Directory bread(block 1987) failed [ 263.161400][T16210] FAT-fs (loop5): Directory bread(block 1992) failed [ 263.169851][T16200] FAT-fs (loop3): Directory bread(block 1990) failed [ 263.174779][T16210] FAT-fs (loop5): Directory bread(block 1993) failed [ 263.181706][T16234] FAT-fs (loop1): Directory bread(block 1988) failed [ 263.188756][T16207] FAT-fs (loop4): Directory bread(block 1989) failed [ 263.196335][T16234] FAT-fs (loop1): Directory bread(block 1989) failed [ 263.202655][T16210] FAT-fs (loop5): Directory bread(block 1994) failed [ 263.209565][T16200] FAT-fs (loop3): Directory bread(block 1991) failed [ 263.217133][T16210] FAT-fs (loop5): Directory bread(block 1995) failed [ 263.230190][T16234] FAT-fs (loop1): Directory bread(block 1990) failed [ 263.235753][T16207] FAT-fs (loop4): Directory bread(block 1990) failed [ 263.242858][T16234] FAT-fs (loop1): Directory bread(block 1991) failed [ 263.258468][T16200] FAT-fs (loop3): Directory bread(block 1992) failed [ 263.260007][T16207] FAT-fs (loop4): Directory bread(block 1991) failed [ 263.265703][T16234] FAT-fs (loop1): Directory bread(block 1992) failed [ 263.274174][T16207] FAT-fs (loop4): Directory bread(block 1992) failed [ 263.284429][T16200] FAT-fs (loop3): Directory bread(block 1993) failed [ 263.286883][T16207] FAT-fs (loop4): Directory bread(block 1993) failed [ 263.295394][T16234] FAT-fs (loop1): Directory bread(block 1993) failed [ 263.309550][T16200] FAT-fs (loop3): Directory bread(block 1994) failed 05:14:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x40000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:48 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x20fffff) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) write(r0, &(0x7f0000000280)="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", 0x1000) 05:14:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 263.311869][T16207] FAT-fs (loop4): Directory bread(block 1994) failed [ 263.319186][T16200] FAT-fs (loop3): Directory bread(block 1995) failed [ 263.331166][T16234] FAT-fs (loop1): Directory bread(block 1994) failed [ 263.335043][T16207] FAT-fs (loop4): Directory bread(block 1995) failed [ 263.344727][T16234] FAT-fs (loop1): Directory bread(block 1995) failed 05:14:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x48000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 263.404066][T16246] loop5: detected capacity change from 0 to 64 05:14:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x4c000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 263.444152][T16246] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 263.461837][T16255] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 263.476702][T16257] loop1: detected capacity change from 0 to 64 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x68000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x6c000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 263.504498][T16257] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 263.519588][T16260] loop3: detected capacity change from 0 to 64 [ 263.526429][T16246] FAT-fs (loop5): Directory bread(block 1986) failed 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x74000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:48 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x20fffff) (async) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) (async) write(r1, &(0x7f0000000100)='=', 0x1) write(r0, &(0x7f0000000280)="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", 0x1000) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x7a000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 263.562340][T16271] loop4: detected capacity change from 0 to 64 [ 263.571940][T16246] FAT-fs (loop5): Directory bread(block 1987) failed [ 263.579827][T16257] FAT-fs (loop1): Directory bread(block 1986) failed [ 263.595313][T16260] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 263.599213][T16246] FAT-fs (loop5): Directory bread(block 1988) failed [ 263.620871][T16246] FAT-fs (loop5): Directory bread(block 1989) failed [ 263.622688][T16257] FAT-fs (loop1): Directory bread(block 1987) failed [ 263.633927][T16246] FAT-fs (loop5): Directory bread(block 1990) failed [ 263.646431][T16246] FAT-fs (loop5): Directory bread(block 1991) failed [ 263.657970][T16246] FAT-fs (loop5): Directory bread(block 1992) failed [ 263.658513][T16257] FAT-fs (loop1): Directory bread(block 1988) failed [ 263.666007][T16282] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 263.672562][T16271] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 263.682451][T16246] FAT-fs (loop5): Directory bread(block 1993) failed [ 263.699625][T16246] FAT-fs (loop5): Directory bread(block 1994) failed [ 263.706917][T16246] FAT-fs (loop5): Directory bread(block 1995) failed [ 263.713940][T16260] FAT-fs (loop3): Directory bread(block 1986) failed [ 263.714047][T16260] FAT-fs (loop3): Directory bread(block 1987) failed [ 263.714191][T16260] FAT-fs (loop3): Directory bread(block 1988) failed [ 263.714271][T16260] FAT-fs (loop3): Directory bread(block 1989) failed [ 263.735537][T16257] FAT-fs (loop1): Directory bread(block 1989) failed [ 263.753878][T16260] FAT-fs (loop3): Directory bread(block 1990) failed [ 263.761156][T16257] FAT-fs (loop1): Directory bread(block 1990) failed 05:14:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x85ffffff, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 263.774990][T16260] FAT-fs (loop3): Directory bread(block 1991) failed [ 263.783941][T16257] FAT-fs (loop1): Directory bread(block 1991) failed [ 263.800074][T16257] FAT-fs (loop1): Directory bread(block 1992) failed [ 263.809610][T16260] FAT-fs (loop3): Directory bread(block 1992) failed [ 263.813512][T16257] FAT-fs (loop1): Directory bread(block 1993) failed 05:14:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0xb0000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 263.825648][T16257] FAT-fs (loop1): Directory bread(block 1994) failed [ 263.829421][T16260] FAT-fs (loop3): Directory bread(block 1993) failed [ 263.832933][T16257] FAT-fs (loop1): Directory bread(block 1995) failed [ 263.841068][T16260] FAT-fs (loop3): Directory bread(block 1994) failed [ 263.853556][T16260] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 05:14:48 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:48 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x20fffff) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) write(r0, &(0x7f0000000280)="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", 0x1000) 05:14:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0xc6020000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0xccd61e00, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 263.924912][T16297] loop5: detected capacity change from 0 to 64 [ 263.927137][T16296] loop4: detected capacity change from 0 to 64 [ 263.950895][T16291] loop1: detected capacity change from 0 to 64 [ 263.964711][T16297] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 263.983623][T16291] FAT-fs (loop1): bogus number of FAT sectors [ 263.990326][T16291] FAT-fs (loop1): Can't find a valid FAT filesystem [ 264.005080][T16297] FAT-fs (loop5): Directory bread(block 1986) failed [ 264.019183][T16306] loop3: detected capacity change from 0 to 64 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0xed000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:48 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0xff000000, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 264.021019][T16308] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 264.032922][T16297] FAT-fs (loop5): Directory bread(block 1987) failed [ 264.071014][T16306] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0xffffff85, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:48 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_io_uring_complete(0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000080)={0x0, 0x6}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xa0080, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c76658a73696f6e3d3970323030302e4c2c6d73697a653d30783030ffffff7f000000003030303030372c70726976706f72742c7365636c6162656c2c6673636f6e746578743d757365725f752c00"]) fcntl$setpipe(r1, 0x407, 0x20fffff) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) [ 264.083163][T16297] FAT-fs (loop5): Directory bread(block 1988) failed [ 264.098759][T16315] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 264.112689][T16297] FAT-fs (loop5): Directory bread(block 1989) failed [ 264.126590][T16297] FAT-fs (loop5): Directory bread(block 1990) failed [ 264.135747][T16297] FAT-fs (loop5): Directory bread(block 1991) failed [ 264.145136][T16297] FAT-fs (loop5): Directory bread(block 1992) failed [ 264.154115][T16297] FAT-fs (loop5): Directory bread(block 1993) failed [ 264.158443][T16306] FAT-fs (loop3): Directory bread(block 1986) failed [ 264.165530][T16297] FAT-fs (loop5): Directory bread(block 1994) failed [ 264.176152][T16297] FAT-fs (loop5): Directory bread(block 1995) failed [ 264.187473][T16306] FAT-fs (loop3): Directory bread(block 1987) failed [ 264.204935][T16325] FAT-fs (loop1): bogus number of reserved sectors [ 264.206155][T16306] FAT-fs (loop3): Directory bread(block 1988) failed [ 264.211647][T16325] FAT-fs (loop1): Can't find a valid FAT filesystem 05:14:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 264.231332][T16306] FAT-fs (loop3): Directory bread(block 1989) failed [ 264.255652][T16306] FAT-fs (loop3): Directory bread(block 1990) failed [ 264.273438][T16325] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 05:14:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 264.284069][T16306] FAT-fs (loop3): Directory bread(block 1991) failed [ 264.303498][T16330] FAT-fs (loop4): bogus number of reserved sectors [ 264.310630][T16330] FAT-fs (loop4): Can't find a valid FAT filesystem [ 264.315238][T16336] loop5: detected capacity change from 0 to 64 [ 264.318294][T16306] FAT-fs (loop3): Directory bread(block 1992) failed [ 264.335968][T16306] FAT-fs (loop3): Directory bread(block 1993) failed [ 264.336226][T16336] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 264.343399][T16306] FAT-fs (loop3): Directory bread(block 1994) failed [ 264.361043][T16306] FAT-fs (loop3): Directory bread(block 1995) failed [ 264.365968][T16336] FAT-fs (loop5): Directory bread(block 1986) failed [ 264.376955][T16336] FAT-fs (loop5): Directory bread(block 1987) failed 05:14:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_io_uring_complete(0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000080)={0x0, 0x6}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xa0080, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c76658a73696f6e3d3970323030302e4c2c6d73697a653d30783030ffffff7f000000003030303030372c70726976706f72742c7365636c6162656c2c6673636f6e746578743d757365725f752c00"]) fcntl$setpipe(r1, 0x407, 0x20fffff) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) pipe(&(0x7f00000000c0)) (async) syz_io_uring_complete(0x0) (async) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000080)={0x0, 0x6}) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xa0080, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c76658a73696f6e3d3970323030302e4c2c6d73697a653d30783030ffffff7f000000003030303030372c70726976706f72742c7365636c6162656c2c6673636f6e746578743d757365725f752c00"]) (async) fcntl$setpipe(r1, 0x407, 0x20fffff) (async) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) (async) write(r1, &(0x7f0000000100)='=', 0x1) (async) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_io_uring_complete(0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000080)={0x0, 0x6}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xa0080, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c76658a73696f6e3d3970323030302e4c2c6d73697a653d30783030ffffff7f000000003030303030372c70726976706f72742c7365636c6162656c2c6673636f6e746578743d757365725f752c00"]) fcntl$setpipe(r1, 0x407, 0x20fffff) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) [ 264.386711][T16336] FAT-fs (loop5): Directory bread(block 1988) failed [ 264.395660][T16336] FAT-fs (loop5): Directory bread(block 1989) failed [ 264.404022][T16336] FAT-fs (loop5): Directory bread(block 1990) failed 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 264.440091][T16336] FAT-fs (loop5): Directory bread(block 1991) failed [ 264.468706][T16336] FAT-fs (loop5): Directory bread(block 1992) failed 05:14:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x7, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x9, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 264.487493][T16336] FAT-fs (loop5): Directory bread(block 1993) failed [ 264.505150][T16354] loop4: detected capacity change from 0 to 64 [ 264.512649][T16356] loop3: detected capacity change from 0 to 64 [ 264.521702][T16336] FAT-fs (loop5): Directory bread(block 1994) failed 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xa, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 264.553191][T16356] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 264.562931][T16336] FAT-fs (loop5): Directory bread(block 1995) failed 05:14:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xb, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r2 = syz_io_uring_complete(0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r0, 0x4010942a, &(0x7f0000000080)={0x0, 0x6}) (async) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xa0080, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c76658a73696f6e3d3970323030302e4c2c6d73697a653d30783030ffffff7f000000003030303030372c70726976706f72742c7365636c6162656c2c6673636f6e746578743d757365725f752c00"]) (async, rerun: 64) fcntl$setpipe(r1, 0x407, 0x20fffff) (rerun: 64) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) (async) write(r1, &(0x7f0000000100)='=', 0x1) [ 264.598982][T16354] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 264.611981][T16356] FAT-fs (loop3): Directory bread(block 1986) failed [ 264.622938][T16354] FAT-fs (loop4): error, invalid access to FAT (entry 0x00fffff8) [ 264.631081][T16354] FAT-fs (loop4): Filesystem has been set read-only 05:14:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 264.644961][T16356] FAT-fs (loop3): Directory bread(block 1987) failed 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xc, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xd, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 264.672039][T16382] loop1: detected capacity change from 0 to 64 [ 264.676066][T16356] FAT-fs (loop3): Directory bread(block 1988) failed [ 264.711640][T16356] FAT-fs (loop3): Directory bread(block 1989) failed [ 264.740024][T16382] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 264.745724][T16387] loop4: detected capacity change from 0 to 64 [ 264.756250][T16356] FAT-fs (loop3): Directory bread(block 1990) failed [ 264.763643][T16389] loop5: detected capacity change from 0 to 64 [ 264.776867][T16382] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 264.780122][T16356] FAT-fs (loop3): Directory bread(block 1991) failed [ 264.784989][T16382] FAT-fs (loop1): Filesystem has been set read-only [ 264.803145][T16389] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 264.807210][T16356] FAT-fs (loop3): Directory bread(block 1992) failed [ 264.824180][T16389] FAT-fs (loop5): Directory bread(block 1986) failed [ 264.831332][T16389] FAT-fs (loop5): Directory bread(block 1987) failed [ 264.831704][T16387] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 264.839957][T16356] FAT-fs (loop3): Directory bread(block 1993) failed [ 264.855846][T16389] FAT-fs (loop5): Directory bread(block 1988) failed [ 264.856797][T16387] FAT-fs (loop4): error, invalid access to FAT (entry 0x00fffff8) [ 264.863929][T16389] FAT-fs (loop5): Directory bread(block 1989) failed [ 264.871151][T16387] FAT-fs (loop4): Filesystem has been set read-only 05:14:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 2: arch_prctl$ARCH_GET_CPUID(0x1011) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x20fffff) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) write(r0, &(0x7f0000000100)='=', 0x1) arch_prctl$ARCH_GET_CPUID(0x1011) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, r2, 0xc15, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x9}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="04002cbd7000fddbdf25010000000000000006410000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000098a0a1aada2f9e4ae8115aae306c41d421fb1476ec6f70b554d472b6b123dc04bbb1b18e43acdcffb08be5ef9f50ae96cf5ed12b12d0f431456bfdc1fd8fa1f7ff4ad435388b0645718cd3e2a3429b4e69be4b386b321379416f481157fe00"/192], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x853) 05:14:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 264.874252][T16356] FAT-fs (loop3): Directory bread(block 1994) failed [ 264.893243][T16356] FAT-fs (loop3): Directory bread(block 1995) failed [ 264.904057][T16389] FAT-fs (loop5): Directory bread(block 1990) failed [ 264.914543][T16389] FAT-fs (loop5): Directory bread(block 1991) failed [ 264.921975][T16389] FAT-fs (loop5): Directory bread(block 1992) failed [ 264.930048][T16389] FAT-fs (loop5): Directory bread(block 1993) failed 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x10, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffff", 0x6, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 264.951762][T16389] FAT-fs (loop5): Directory bread(block 1994) failed [ 264.966507][T16398] loop1: detected capacity change from 0 to 64 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x11, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) [ 264.998726][T16389] FAT-fs (loop5): Directory bread(block 1995) failed [ 265.000724][T16398] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.028738][T16408] loop4: detected capacity change from 0 to 64 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x12, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 265.044400][T16398] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 265.052452][T16398] FAT-fs (loop1): Filesystem has been set read-only [ 265.061625][T16413] tipc: Started in network mode [ 265.066670][T16413] tipc: Node identity 9, cluster identity 4711 [ 265.072925][T16413] tipc: Node number set to 9 [ 265.085830][T16414] loop3: detected capacity change from 0 to 64 05:14:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x36, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x57, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 265.095218][T16408] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.111675][T16408] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 265.121063][T16408] FAT-fs (loop4): Filesystem has been set read-only 05:14:49 executing program 2: arch_prctl$ARCH_GET_CPUID(0x1011) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x20fffff) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) (async) write(r0, &(0x7f0000000100)='=', 0x1) (async) arch_prctl$ARCH_GET_CPUID(0x1011) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, r2, 0xc15, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x9}}}, 0x24}}, 0x0) (async) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="04002cbd7000fddbdf25010000000000000006410000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000098a0a1aada2f9e4ae8115aae306c41d421fb1476ec6f70b554d472b6b123dc04bbb1b18e43acdcffb08be5ef9f50ae96cf5ed12b12d0f431456bfdc1fd8fa1f7ff4ad435388b0645718cd3e2a3429b4e69be4b386b321379416f481157fe00"/192], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x853) 05:14:49 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x5f, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 265.154830][T16414] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.191901][T16432] loop5: detected capacity change from 0 to 64 05:14:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x70, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 265.211322][T16432] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x3fe, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 265.251800][T16414] FAT-fs (loop3): Directory bread(block 1986) failed [ 265.265529][T16436] loop1: detected capacity change from 0 to 64 [ 265.278582][T16432] FAT-fs (loop5): Directory bread(block 1986) failed [ 265.291707][T16440] loop4: detected capacity change from 0 to 64 [ 265.299402][T16414] FAT-fs (loop3): Directory bread(block 1987) failed [ 265.306380][T16414] FAT-fs (loop3): Directory bread(block 1988) failed [ 265.314550][T16432] FAT-fs (loop5): Directory bread(block 1987) failed [ 265.327497][T16436] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.333800][T16432] FAT-fs (loop5): Directory bread(block 1988) failed [ 265.344629][T16432] FAT-fs (loop5): Directory bread(block 1989) failed [ 265.352143][T16436] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 265.353101][T16414] FAT-fs (loop3): Directory bread(block 1989) failed [ 265.360376][T16436] FAT-fs (loop1): Filesystem has been set read-only [ 265.362580][T16432] FAT-fs (loop5): Directory bread(block 1990) failed [ 265.374304][T16440] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.381388][T16432] FAT-fs (loop5): Directory bread(block 1991) failed [ 265.391930][T16414] FAT-fs (loop3): Directory bread(block 1990) failed [ 265.400321][T16432] FAT-fs (loop5): Directory bread(block 1992) failed [ 265.422887][T16414] FAT-fs (loop3): Directory bread(block 1991) failed [ 265.429584][T16432] FAT-fs (loop5): Directory bread(block 1993) failed 05:14:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32], 0x3c}}, 0x0) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x4c00, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:50 executing program 2: arch_prctl$ARCH_GET_CPUID(0x1011) (async) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x20fffff) (async) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) (async) write(r0, &(0x7f0000000100)='=', 0x1) (async) arch_prctl$ARCH_GET_CPUID(0x1011) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x24, r2, 0xc15, 0x0, 0x0, {{}, {}, {0x8, 0x11, 0x9}}}, 0x24}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="04002cbd7000fddbdf25010000000000000006410000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000098a0a1aada2f9e4ae8115aae306c41d421fb1476ec6f70b554d472b6b123dc04bbb1b18e43acdcffb08be5ef9f50ae96cf5ed12b12d0f431456bfdc1fd8fa1f7ff4ad435388b0645718cd3e2a3429b4e69be4b386b321379416f481157fe00"/192], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x853) 05:14:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) 05:14:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 265.439394][T16414] FAT-fs (loop3): Directory bread(block 1992) failed [ 265.444409][T16432] FAT-fs (loop5): Directory bread(block 1994) failed [ 265.458899][T16414] FAT-fs (loop3): Directory bread(block 1993) failed [ 265.473875][T16432] FAT-fs (loop5): Directory bread(block 1995) failed [ 265.475306][T16414] FAT-fs (loop3): Directory bread(block 1994) failed [ 265.490266][T16414] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8800, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:14:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) [ 265.535579][T16452] loop1: detected capacity change from 0 to 64 [ 265.574647][T16461] loop5: detected capacity change from 0 to 64 05:14:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32], 0x3c}}, 0x0) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 265.585537][T16452] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.610727][T16467] loop4: detected capacity change from 0 to 64 [ 265.619941][T16452] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 265.628092][T16452] FAT-fs (loop1): Filesystem has been set read-only 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2, 0x10, 0x0}, 0x80) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x3, 0x10, 0x0}, 0x80) [ 265.646322][T16469] loop3: detected capacity change from 0 to 64 [ 265.646828][T16467] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.674731][T16461] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:50 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r2, 0x400}, 0x14}, 0x1, 0x0, 0x0, 0x480c4}, 0x0) fcntl$setpipe(r0, 0x407, 0x20fffff) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) write(r0, &(0x7f0000000100)='=', 0x1) socket$xdp(0x2c, 0x3, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x7, 0xc491, 0x4}) [ 265.693889][T16469] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.729591][T16461] FAT-fs (loop5): Directory bread(block 1986) failed [ 265.736777][T16461] FAT-fs (loop5): Directory bread(block 1987) failed 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x4, 0x10, 0x0}, 0x80) 05:14:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x5, 0x10, 0x0}, 0x80) [ 265.744625][T16461] FAT-fs (loop5): Directory bread(block 1988) failed [ 265.791407][T16485] loop1: detected capacity change from 0 to 64 [ 265.803493][T16461] FAT-fs (loop5): Directory bread(block 1989) failed [ 265.808837][T16469] FAT-fs (loop3): Directory bread(block 1986) failed [ 265.829324][T16469] FAT-fs (loop3): Directory bread(block 1987) failed [ 265.831117][T16485] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 265.839528][T16469] FAT-fs (loop3): Directory bread(block 1988) failed [ 265.851703][T16461] FAT-fs (loop5): Directory bread(block 1990) failed [ 265.854009][T16469] FAT-fs (loop3): Directory bread(block 1989) failed [ 265.866175][T16469] FAT-fs (loop3): Directory bread(block 1990) failed [ 265.874996][T16469] FAT-fs (loop3): Directory bread(block 1991) failed [ 265.882115][T16461] FAT-fs (loop5): Directory bread(block 1991) failed [ 265.882239][T16461] FAT-fs (loop5): Directory bread(block 1992) failed [ 265.891174][T16469] FAT-fs (loop3): Directory bread(block 1992) failed [ 265.899011][T16485] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 265.903316][T16469] FAT-fs (loop3): Directory bread(block 1993) failed [ 265.910602][T16485] FAT-fs (loop1): Filesystem has been set read-only [ 265.911284][T16461] FAT-fs (loop5): Directory bread(block 1993) failed [ 265.919412][T16469] FAT-fs (loop3): Directory bread(block 1994) failed 05:14:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x6, 0x10, 0x0}, 0x80) [ 265.925980][T16461] FAT-fs (loop5): Directory bread(block 1994) failed [ 265.931886][T16469] FAT-fs (loop3): Directory bread(block 1995) failed [ 265.938564][T16461] FAT-fs (loop5): Directory bread(block 1995) failed 05:14:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32], 0x3c}}, 0x0) 05:14:50 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r2, 0x400}, 0x14}, 0x1, 0x0, 0x0, 0x480c4}, 0x0) fcntl$setpipe(r0, 0x407, 0x20fffff) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) write(r0, &(0x7f0000000100)='=', 0x1) socket$xdp(0x2c, 0x3, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x7, 0xc491, 0x4}) pipe(&(0x7f00000000c0)) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r3) (async) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r2, 0x400}, 0x14}, 0x1, 0x0, 0x0, 0x480c4}, 0x0) (async) fcntl$setpipe(r0, 0x407, 0x20fffff) (async) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) (async) write(r0, &(0x7f0000000100)='=', 0x1) (async) socket$xdp(0x2c, 0x3, 0x0) (async) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x7, 0xc491, 0x4}) (async) 05:14:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x7, 0x10, 0x0}, 0x80) 05:14:50 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 265.992508][T16493] loop4: detected capacity change from 0 to 64 [ 266.020566][T16493] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x8, 0x10, 0x0}, 0x80) [ 266.042286][T16498] loop1: detected capacity change from 0 to 64 [ 266.060987][T16503] loop5: detected capacity change from 0 to 64 [ 266.068255][T16493] FAT-fs (loop4): Directory bread(block 1986) failed 05:14:50 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB], 0x3c}}, 0x0) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x9, 0x10, 0x0}, 0x80) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xa, 0x10, 0x0}, 0x80) [ 266.096909][T16493] FAT-fs (loop4): Directory bread(block 1987) failed [ 266.105257][T16498] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 266.124994][T16493] FAT-fs (loop4): Directory bread(block 1988) failed [ 266.126308][T16503] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xb, 0x10, 0x0}, 0x80) [ 266.146789][T16513] loop3: detected capacity change from 0 to 64 [ 266.153269][T16493] FAT-fs (loop4): Directory bread(block 1989) failed [ 266.153879][T16498] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 266.168623][T16498] FAT-fs (loop1): Filesystem has been set read-only [ 266.194368][T16493] FAT-fs (loop4): Directory bread(block 1990) failed [ 266.195054][T16503] FAT-fs (loop5): Directory bread(block 1986) failed [ 266.204518][T16493] FAT-fs (loop4): Directory bread(block 1991) failed [ 266.220558][T16503] FAT-fs (loop5): Directory bread(block 1987) failed [ 266.225866][T16493] FAT-fs (loop4): Directory bread(block 1992) failed [ 266.229694][T16513] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 266.235064][T16493] FAT-fs (loop4): Directory bread(block 1993) failed [ 266.245047][T16503] FAT-fs (loop5): Directory bread(block 1988) failed [ 266.261346][T16493] FAT-fs (loop4): Directory bread(block 1994) failed [ 266.269426][T16493] FAT-fs (loop4): Directory bread(block 1995) failed [ 266.285773][T16513] FAT-fs (loop3): Directory bread(block 1986) failed [ 266.293265][T16503] FAT-fs (loop5): Directory bread(block 1989) failed [ 266.300050][T16513] FAT-fs (loop3): Directory bread(block 1987) failed [ 266.311441][T16503] FAT-fs (loop5): Directory bread(block 1990) failed [ 266.311628][T16513] FAT-fs (loop3): Directory bread(block 1988) failed [ 266.326658][T16513] FAT-fs (loop3): Directory bread(block 1989) failed [ 266.330481][T16503] FAT-fs (loop5): Directory bread(block 1991) failed [ 266.333881][T16513] FAT-fs (loop3): Directory bread(block 1990) failed 05:14:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:51 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) (async) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14, r2, 0x400}, 0x14}, 0x1, 0x0, 0x0, 0x480c4}, 0x0) fcntl$setpipe(r0, 0x407, 0x20fffff) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) write(r0, &(0x7f0000000100)='=', 0x1) (async) socket$xdp(0x2c, 0x3, 0x0) (async) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x7, 0xc491, 0x4}) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xc, 0x10, 0x0}, 0x80) 05:14:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) [ 266.343863][T16503] FAT-fs (loop5): Directory bread(block 1992) failed [ 266.350894][T16513] FAT-fs (loop3): Directory bread(block 1991) failed [ 266.366978][T16513] FAT-fs (loop3): Directory bread(block 1992) failed [ 266.372409][ T6282] blk_print_req_error: 21 callbacks suppressed [ 266.372424][ T6282] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 266.374202][T16513] FAT-fs (loop3): Directory bread(block 1993) failed 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xd, 0x10, 0x0}, 0x80) [ 266.397105][T16503] FAT-fs (loop5): Directory bread(block 1993) failed [ 266.399785][T16541] loop1: detected capacity change from 0 to 64 [ 266.424731][T16513] FAT-fs (loop3): Directory bread(block 1994) failed [ 266.429094][T16503] FAT-fs (loop5): Directory bread(block 1994) failed [ 266.432268][T16541] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80) [ 266.449476][T16513] FAT-fs (loop3): Directory bread(block 1995) failed [ 266.457029][ T6282] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 266.459612][T16541] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 266.466316][ T6282] Buffer I/O error on dev loop4, logical block 0, async page read [ 266.482383][T16541] FAT-fs (loop1): Filesystem has been set read-only [ 266.493023][T16503] FAT-fs (loop5): Directory bread(block 1995) failed 05:14:51 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x10, 0x10, 0x0}, 0x80) 05:14:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB], 0x3c}}, 0x0) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x11, 0x10, 0x0}, 0x80) 05:14:51 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x20fffff) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) read$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) write(r0, &(0x7f0000000100)='=', 0x1) 05:14:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) [ 266.564168][T16554] loop4: detected capacity change from 0 to 64 [ 266.571192][ T6282] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 266.579432][T16557] loop5: detected capacity change from 0 to 64 [ 266.580981][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 266.581025][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 266.606302][ T8029] Buffer I/O error on dev loop5, logical block 0, async page read [ 266.616992][T16552] loop3: detected capacity change from 0 to 64 [ 266.626761][ T6282] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 266.636050][ T6282] Buffer I/O error on dev loop3, logical block 0, async page read [ 266.641372][T16562] loop1: detected capacity change from 0 to 64 [ 266.652410][T16554] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x12, 0x10, 0x0}, 0x80) [ 266.670010][T16554] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 266.671626][T16557] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 266.679067][T16554] FAT-fs (loop4): Filesystem has been set read-only [ 266.679397][T16552] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x18, 0x10, 0x0}, 0x80) [ 266.721052][T16564] __nla_validate_parse: 11 callbacks suppressed [ 266.721070][T16564] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 266.732531][T16562] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x25, 0x10, 0x0}, 0x80) [ 266.764048][T16552] FAT-fs (loop3): Directory bread(block 1986) failed [ 266.790178][T16557] FAT-fs (loop5): Directory bread(block 1986) failed [ 266.800272][T16552] FAT-fs (loop3): Directory bread(block 1987) failed 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x48, 0x10, 0x0}, 0x80) 05:14:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) [ 266.801971][T16562] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 266.814992][T16562] FAT-fs (loop1): Filesystem has been set read-only [ 266.825283][T16557] FAT-fs (loop5): Directory bread(block 1987) failed [ 266.829198][T16552] FAT-fs (loop3): Directory bread(block 1988) failed [ 266.843182][T16557] FAT-fs (loop5): Directory bread(block 1988) failed [ 266.846722][T16580] loop4: detected capacity change from 0 to 64 [ 266.856466][T16557] FAT-fs (loop5): Directory bread(block 1989) failed [ 266.867618][T16552] FAT-fs (loop3): Directory bread(block 1989) failed [ 266.868047][T16557] FAT-fs (loop5): Directory bread(block 1990) failed [ 266.881810][T16557] FAT-fs (loop5): Directory bread(block 1991) failed [ 266.883968][T16580] FAT-fs (loop4): bogus number of reserved sectors [ 266.889131][T16557] FAT-fs (loop5): Directory bread(block 1992) failed [ 266.889220][T16557] FAT-fs (loop5): Directory bread(block 1993) failed [ 266.895738][T16580] FAT-fs (loop4): Can't find a valid FAT filesystem 05:14:51 executing program 5: getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:51 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x20fffff) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) read$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) write(r0, &(0x7f0000000100)='=', 0x1) pipe(&(0x7f00000000c0)) (async) fcntl$setpipe(r0, 0x407, 0x20fffff) (async) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) (async) read$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) (async) write(r0, &(0x7f0000000100)='=', 0x1) (async) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x4c, 0x10, 0x0}, 0x80) [ 266.896568][T16552] FAT-fs (loop3): Directory bread(block 1990) failed [ 266.903431][T16557] FAT-fs (loop5): Directory bread(block 1994) failed [ 266.911077][T16552] FAT-fs (loop3): Directory bread(block 1991) failed [ 266.916799][T16557] FAT-fs (loop5): Directory bread(block 1995) failed [ 266.923676][T16552] FAT-fs (loop3): Directory bread(block 1992) failed [ 266.951241][T16552] FAT-fs (loop3): Directory bread(block 1993) failed [ 266.959987][T16552] FAT-fs (loop3): Directory bread(block 1994) failed 05:14:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB], 0x3c}}, 0x0) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x68, 0x10, 0x0}, 0x80) 05:14:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) 05:14:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffff", 0x6, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:51 executing program 5: getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 267.008936][ T6282] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 267.012544][T16552] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x6c, 0x10, 0x0}, 0x80) 05:14:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012"], 0x3c}}, 0x0) [ 267.075792][T16597] loop5: detected capacity change from 0 to 64 [ 267.080279][T16594] loop1: detected capacity change from 0 to 64 [ 267.093188][T16596] loop4: detected capacity change from 0 to 64 [ 267.094009][T16597] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:51 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x74, 0x10, 0x0}, 0x80) [ 267.117672][ T8029] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 267.132153][T16597] FAT-fs (loop5): Directory bread(block 1986) failed [ 267.144620][T16594] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 267.149877][T16607] loop3: detected capacity change from 0 to 64 [ 267.163883][T16597] FAT-fs (loop5): Directory bread(block 1987) failed 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x7a, 0x10, 0x0}, 0x80) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xb0, 0x10, 0x0}, 0x80) [ 267.167463][T16596] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 267.176352][T16597] FAT-fs (loop5): Directory bread(block 1988) failed [ 267.188276][T16594] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 267.196370][T16594] FAT-fs (loop1): Filesystem has been set read-only [ 267.203859][T16597] FAT-fs (loop5): Directory bread(block 1989) failed [ 267.211343][T16613] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 267.218066][T16597] FAT-fs (loop5): Directory bread(block 1990) failed [ 267.224175][T16596] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 267.236208][T16596] FAT-fs (loop4): Filesystem has been set read-only [ 267.249874][T16607] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 267.260208][T16597] FAT-fs (loop5): Directory bread(block 1991) failed [ 267.267807][T16597] FAT-fs (loop5): Directory bread(block 1992) failed 05:14:52 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x20fffff) (async) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) read$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) (async) write(r0, &(0x7f0000000100)='=', 0x1) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xed, 0x10, 0x0}, 0x80) [ 267.274591][T16597] FAT-fs (loop5): Directory bread(block 1993) failed [ 267.281519][T16607] FAT-fs (loop3): Directory bread(block 1986) failed [ 267.281608][T16597] FAT-fs (loop5): Directory bread(block 1994) failed [ 267.281660][T16607] FAT-fs (loop3): Directory bread(block 1987) failed [ 267.288735][T16597] FAT-fs (loop5): Directory bread(block 1995) failed [ 267.312219][T16607] FAT-fs (loop3): Directory bread(block 1988) failed 05:14:52 executing program 5: getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x210, 0x10, 0x0}, 0x80) 05:14:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) [ 267.320757][T16607] FAT-fs (loop3): Directory bread(block 1989) failed [ 267.333467][T16607] FAT-fs (loop3): Directory bread(block 1990) failed [ 267.356697][T16607] FAT-fs (loop3): Directory bread(block 1991) failed 05:14:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) 05:14:52 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 267.368340][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 267.378839][T16607] FAT-fs (loop3): Directory bread(block 1992) failed [ 267.403610][T16607] FAT-fs (loop3): Directory bread(block 1993) failed [ 267.404774][T16632] loop5: detected capacity change from 0 to 64 [ 267.413106][T16607] FAT-fs (loop3): Directory bread(block 1994) failed 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2c6, 0x10, 0x0}, 0x80) [ 267.419148][T16629] loop1: detected capacity change from 0 to 64 [ 267.430940][T16607] FAT-fs (loop3): Directory bread(block 1995) failed [ 267.450153][T16633] loop4: detected capacity change from 0 to 64 [ 267.458512][T16632] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 267.473144][T16629] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012"], 0x3c}}, 0x0) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x300, 0x10, 0x0}, 0x80) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x500, 0x10, 0x0}, 0x80) [ 267.500647][T16632] FAT-fs (loop5): Directory bread(block 1986) failed [ 267.514595][ T6282] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 267.524499][T16633] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 267.537783][T16629] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) 05:14:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012"], 0x3c}}, 0x0) 05:14:52 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x20fffff) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WDS_PEER(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r4, 0x1, 0x0, 0x0, {{0x2}, {@val={0x14, 0x6}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000844}, 0x20000004) write(r1, &(0x7f0000000100)='=', 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80000000}, 0x1c) r5 = socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x810, r5, 0xfac87000) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)={0x1df, 0x2, &(0x7f0000000280)="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"}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x1010, 0xffffffffffffffff, 0x1b978000) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x600, 0x10, 0x0}, 0x80) [ 267.545923][T16629] FAT-fs (loop1): Filesystem has been set read-only [ 267.550919][T16632] FAT-fs (loop5): Directory bread(block 1987) failed [ 267.558793][T16633] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 267.567532][T16633] FAT-fs (loop4): Filesystem has been set read-only [ 267.574970][ T6282] Buffer I/O error on dev loop3, logical block 0, async page read [ 267.584558][T16632] FAT-fs (loop5): Directory bread(block 1988) failed 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x700, 0x10, 0x0}, 0x80) [ 267.598270][T16646] loop3: detected capacity change from 0 to 64 [ 267.607623][T16632] FAT-fs (loop5): Directory bread(block 1989) failed [ 267.618438][T16646] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 267.619620][T16632] FAT-fs (loop5): Directory bread(block 1990) failed 05:14:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) 05:14:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x900, 0x10, 0x0}, 0x80) [ 267.657490][T16652] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 267.669335][T16646] FAT-fs (loop3): Directory bread(block 1986) failed [ 267.676896][T16646] FAT-fs (loop3): Directory bread(block 1987) failed [ 267.691355][T16632] FAT-fs (loop5): Directory bread(block 1991) failed [ 267.696541][T16646] FAT-fs (loop3): Directory bread(block 1988) failed [ 267.707731][T16656] loop4: detected capacity change from 0 to 64 [ 267.720900][T16661] loop1: detected capacity change from 0 to 64 [ 267.724281][T16632] FAT-fs (loop5): Directory bread(block 1992) failed [ 267.729498][T16646] FAT-fs (loop3): Directory bread(block 1989) failed [ 267.749963][ T24] audit: type=1400 audit(1643778892.561:285): avc: denied { map } for pid=16647 comm="syz-executor.2" path="socket:[50713]" dev="sockfs" ino=50713 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 267.750045][T16656] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 267.783627][T16646] FAT-fs (loop3): Directory bread(block 1990) failed [ 267.785192][T16632] FAT-fs (loop5): Directory bread(block 1993) failed [ 267.797933][T16632] FAT-fs (loop5): Directory bread(block 1994) failed [ 267.804929][T16632] FAT-fs (loop5): Directory bread(block 1995) failed [ 267.807556][T16646] FAT-fs (loop3): Directory bread(block 1991) failed [ 267.819612][T16661] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 267.821879][T16656] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 267.829799][T16646] FAT-fs (loop3): Directory bread(block 1992) failed [ 267.837197][T16656] FAT-fs (loop4): Filesystem has been set read-only 05:14:52 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xa00, 0x10, 0x0}, 0x80) 05:14:52 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x20fffff) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WDS_PEER(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r4, 0x1, 0x0, 0x0, {{0x2}, {@val={0x14, 0x6}, @val={0xc}}}}, 0x28}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000844}, 0x20000004) write(r1, &(0x7f0000000100)='=', 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80000000}, 0x1c) r5 = socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x810, r5, 0xfac87000) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)={0x1df, 0x2, &(0x7f0000000280)="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"}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x1010, 0xffffffffffffffff, 0x1b978000) pipe(&(0x7f00000000c0)) (async) fcntl$setpipe(r1, 0x407, 0x20fffff) (async) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) (async) socket(0x10, 0x2, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) (async) sendmsg$NL80211_CMD_SET_WDS_PEER(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r4, 0x1, 0x0, 0x0, {{0x2}, {@val={0x14, 0x6}, @val={0xc}}}}, 0x28}}, 0x0) (async) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000844}, 0x20000004) (async) write(r1, &(0x7f0000000100)='=', 0x1) (async) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80000000}, 0x1c) (async) socket$l2tp(0x2, 0x2, 0x73) (async) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x810, r5, 0xfac87000) (async) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)={0x1df, 0x2, &(0x7f0000000280)="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"}) (async) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x1010, 0xffffffffffffffff, 0x1b978000) (async) 05:14:52 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 267.852071][T16661] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 267.857349][T16646] FAT-fs (loop3): Directory bread(block 1993) failed [ 267.860414][T16661] FAT-fs (loop1): Filesystem has been set read-only [ 267.867656][T16646] FAT-fs (loop3): Directory bread(block 1994) failed [ 267.888976][T16646] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) [ 267.930756][T16672] loop5: detected capacity change from 0 to 64 [ 267.951244][T16672] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 267.965093][T16674] loop1: detected capacity change from 0 to 64 05:14:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) 05:14:52 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xb00, 0x10, 0x0}, 0x80) [ 267.973780][T16675] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 267.992841][T16672] FAT-fs (loop5): Directory bread(block 1986) failed [ 267.996697][T16679] loop4: detected capacity change from 0 to 64 [ 268.007617][T16672] FAT-fs (loop5): Directory bread(block 1987) failed 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xc00, 0x10, 0x0}, 0x80) [ 268.032304][T16674] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.045297][T16672] FAT-fs (loop5): Directory bread(block 1988) failed [ 268.052274][T16679] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.056525][T16672] FAT-fs (loop5): Directory bread(block 1989) failed [ 268.067358][T16674] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 268.073286][T16672] FAT-fs (loop5): Directory bread(block 1990) failed 05:14:52 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xd00, 0x10, 0x0}, 0x80) [ 268.076218][T16674] FAT-fs (loop1): Filesystem has been set read-only [ 268.083216][T16672] FAT-fs (loop5): Directory bread(block 1991) failed [ 268.103320][T16679] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 268.111443][T16679] FAT-fs (loop4): Filesystem has been set read-only [ 268.114550][T16672] FAT-fs (loop5): Directory bread(block 1992) failed [ 268.125920][T16672] FAT-fs (loop5): Directory bread(block 1993) failed 05:14:52 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xe00, 0x10, 0x0}, 0x80) 05:14:52 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x20fffff) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) (async) r2 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WDS_PEER(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, r4, 0x1, 0x0, 0x0, {{0x2}, {@val={0x14, 0x6}, @val={0xc}}}}, 0x28}}, 0x0) (async) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000844}, 0x20000004) write(r1, &(0x7f0000000100)='=', 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80000000}, 0x1c) (async) r5 = socket$l2tp(0x2, 0x2, 0x73) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x810, r5, 0xfac87000) (async) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000040)={0x1df, 0x2, &(0x7f0000000280)="7a508e65994ec0b7613b1e85a24a4f26fd850ea9cc623983e206737b4b011d4079381e01d9f47bef639790d7b1448660beeb003e85b9fca5823859d885906a7059c4348dc826996207fe7187f0c4b5a22196d6cd8cea0198b67ce4493365604f4036cc89b96b4ef0e0599f9c993eb2c0372d87a3c3a90d8b1520fb0cb07e665a9d1b129a8c8789fdaf3477337f9fb9a412a5e39e0a671db5839fc432cffb1fb7a78909e75987efa0843c175cee40d91f8fdc30afac04ce778b2a5200035a1f5961597c8531e1526366eb764f137d7b1a4209c34eb5ece46d419fb2ad192a4cedf149f68eab64c384c54884c53cd728a59c6f7a0e4ebe385c01673abcc3bb199d30d07022780aed707b469470588c33544eb4c164283d58992e2bb1a8b2064dfa213c4ffd7602acf256528f9da4724d97af1ed3b748796f9b2c727987afe229c5cda51e1439d2df4febf24b56630ef533674caf64bcfa520d9ad526582ac111c20e89be9fef0330c069dec05b206901d90f37ccf84599c9d9a8f25c51670f3dc0b03da83d57f50c74a9f4bb0ea023def8a39d7c6ed6f976f64ab853ec07df21b4aa5dc3b26d6e82b48fc0363520ba51eb3ed127e55bbf90c62986d59923f475333df13f8bcce3d2cbf55b453da8381cc8387e7a5be0c6e73b623b93093abcf6c17987e109d733a726a7d797bb091d2c2cfb85d5d116845e49bdca5a3a765978069e035c00208251314adbf2e582dc43c939f86363a89c1a89c2c2bb3c8c5f487961586f6fcdd931f61e35e51c9ac88f9dc5bd1fbd5919069b2096f3fecd50cd24147c9052197748342638ab3e5ad0f9a5004e4edb0457c99a98e31b437ecaac6f83f5b149b37db2b449b85bc8a37ae70f471d338b02288612c6dd590c5d3da97b112d38a6ecc0882d7038ca0e95ed6ffbacb07b2df6539a8fad03cd419e0a9437bcd72b4594705c7df5bc3f44b0bc81434b812a4f9c6e063830740a699b800992220a5be051a9af7120c9226ed8d6b5ac60c5950234d96ee8ebf168f6bc0e92bae34b1806e369c3976fd96e12a9f36008665c26ec71f4e82ac66b0966b628d4d4b6046d2f580525e385d526497b4f7807e2ceb20804eff9dd5c9ddbf63fa136a523b67e9444faff80753812cfba087a8a8225a7255bb1467395d0e3ff47e7b681e6bc4ccb221c9dcbe3a45c30d5f5f56a938e8bde1152d44a9b61f46ef9746d2a757071c6e6f2c844e12c5374d0b11ffb24445ad9860b16e0e0fa600ecef174094b971aa98dae1bdd65567afd7eaad45899e4e5811f5c5cb49feabf7af0beb33ca1cbc5b500d6a38681f8593050943efb846c3ce840e77df6531b156906c17f90cc0a211953cd2f6f16f0cf2ad29c5a18c9ee03a0791a8357637d1a897d159766ea0802ecf8414e18dda7ff081a9a07365760b9ef0059600d4fc3c676f2caa80b"}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000001, 0x1010, 0xffffffffffffffff, 0x1b978000) 05:14:52 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 268.135389][T16672] FAT-fs (loop5): Directory bread(block 1994) failed [ 268.143653][T16672] FAT-fs (loop5): Directory bread(block 1995) failed [ 268.148112][T16698] loop3: detected capacity change from 0 to 64 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1002, 0x10, 0x0}, 0x80) 05:14:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1100, 0x10, 0x0}, 0x80) 05:14:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 268.211099][T16698] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.212090][T16706] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 268.246991][T16714] loop4: detected capacity change from 0 to 64 [ 268.247621][T16716] loop5: detected capacity change from 0 to 64 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1200, 0x10, 0x0}, 0x80) [ 268.272016][T16720] loop1: detected capacity change from 0 to 64 [ 268.279024][T16716] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.299157][T16716] FAT-fs (loop5): Directory bread(block 1986) failed [ 268.311035][T16720] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.316231][T16714] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.327531][T16720] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 268.330723][T16698] FAT-fs (loop3): Directory bread(block 1986) failed [ 268.338164][T16720] FAT-fs (loop1): Filesystem has been set read-only [ 268.345833][T16716] FAT-fs (loop5): Directory bread(block 1987) failed [ 268.355623][T16714] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1800, 0x10, 0x0}, 0x80) [ 268.370018][T16714] FAT-fs (loop4): Filesystem has been set read-only [ 268.379907][T16698] FAT-fs (loop3): Directory bread(block 1987) failed [ 268.388067][T16698] FAT-fs (loop3): Directory bread(block 1988) failed [ 268.391223][T16716] FAT-fs (loop5): Directory bread(block 1988) failed [ 268.401928][T16716] FAT-fs (loop5): Directory bread(block 1989) failed [ 268.405595][T16698] FAT-fs (loop3): Directory bread(block 1989) failed [ 268.419749][T16698] FAT-fs (loop3): Directory bread(block 1990) failed [ 268.426574][T16716] FAT-fs (loop5): Directory bread(block 1990) failed [ 268.429727][T16698] FAT-fs (loop3): Directory bread(block 1991) failed [ 268.436673][T16716] FAT-fs (loop5): Directory bread(block 1991) failed [ 268.454571][T16698] FAT-fs (loop3): Directory bread(block 1992) failed [ 268.462660][T16698] FAT-fs (loop3): Directory bread(block 1993) failed 05:14:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c001200"], 0x3c}}, 0x0) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2000, 0x10, 0x0}, 0x80) 05:14:53 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x5) fcntl$setpipe(r0, 0x407, 0x20fffff) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) write(r0, &(0x7f0000000100)='=', 0x1) 05:14:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) 05:14:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 268.470120][T16698] FAT-fs (loop3): Directory bread(block 1994) failed [ 268.474846][T16716] FAT-fs (loop5): Directory bread(block 1992) failed [ 268.477110][T16698] FAT-fs (loop3): Directory bread(block 1995) failed [ 268.491702][T16716] FAT-fs (loop5): Directory bread(block 1993) failed [ 268.503541][T16716] FAT-fs (loop5): Directory bread(block 1994) failed [ 268.514000][T16716] FAT-fs (loop5): Directory bread(block 1995) failed 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2500, 0x10, 0x0}, 0x80) 05:14:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 268.535266][T16735] loop4: detected capacity change from 0 to 64 [ 268.536128][T16734] loop1: detected capacity change from 0 to 64 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x4000, 0x10, 0x0}, 0x80) 05:14:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c001200"], 0x3c}}, 0x0) [ 268.580256][T16735] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.614697][T16747] loop5: detected capacity change from 0 to 64 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x4800, 0x10, 0x0}, 0x80) [ 268.624407][T16735] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 268.632498][T16735] FAT-fs (loop4): Filesystem has been set read-only [ 268.639752][T16734] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.645027][T16748] loop3: detected capacity change from 0 to 64 [ 268.660607][T16747] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.671859][T16748] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x4c00, 0x10, 0x0}, 0x80) 05:14:53 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x5) fcntl$setpipe(r0, 0x407, 0x20fffff) (async) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) (async) write(r0, &(0x7f0000000100)='=', 0x1) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x6800, 0x10, 0x0}, 0x80) [ 268.676869][T16734] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 268.688165][T16747] FAT-fs (loop5): Directory bread(block 1986) failed [ 268.689368][T16734] FAT-fs (loop1): Filesystem has been set read-only [ 268.697385][T16747] FAT-fs (loop5): Directory bread(block 1987) failed [ 268.710777][T16747] FAT-fs (loop5): Directory bread(block 1988) failed 05:14:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x6c00, 0x10, 0x0}, 0x80) [ 268.740754][T16748] FAT-fs (loop3): Directory bread(block 1986) failed [ 268.742755][T16747] FAT-fs (loop5): Directory bread(block 1989) failed [ 268.766099][T16748] FAT-fs (loop3): Directory bread(block 1987) failed 05:14:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x7400, 0x10, 0x0}, 0x80) [ 268.784834][T16747] FAT-fs (loop5): Directory bread(block 1990) failed [ 268.787373][T16748] FAT-fs (loop3): Directory bread(block 1988) failed [ 268.798654][T16747] FAT-fs (loop5): Directory bread(block 1991) failed [ 268.802724][T16764] loop4: detected capacity change from 0 to 64 [ 268.814880][T16766] loop1: detected capacity change from 0 to 64 [ 268.826446][T16748] FAT-fs (loop3): Directory bread(block 1989) failed [ 268.832228][T16747] FAT-fs (loop5): Directory bread(block 1992) failed [ 268.853270][T16748] FAT-fs (loop3): Directory bread(block 1990) failed [ 268.854081][T16766] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.871642][T16766] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 268.879795][T16766] FAT-fs (loop1): Filesystem has been set read-only [ 268.886954][T16747] FAT-fs (loop5): Directory bread(block 1993) failed [ 268.888691][T16748] FAT-fs (loop3): Directory bread(block 1991) failed 05:14:53 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x5) fcntl$setpipe(r0, 0x407, 0x20fffff) (async) write$eventfd(r0, &(0x7f0000000240), 0xffffff14) write(r0, &(0x7f0000000100)='=', 0x1) [ 268.896042][T16747] FAT-fs (loop5): Directory bread(block 1994) failed [ 268.904661][T16748] FAT-fs (loop3): Directory bread(block 1992) failed [ 268.912790][T16747] FAT-fs (loop5): Directory bread(block 1995) failed [ 268.916764][T16764] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 268.933510][T16748] FAT-fs (loop3): Directory bread(block 1993) failed [ 268.941539][T16748] FAT-fs (loop3): Directory bread(block 1994) failed 05:14:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x7a00, 0x10, 0x0}, 0x80) [ 268.954109][T16764] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 268.962307][T16764] FAT-fs (loop4): Filesystem has been set read-only [ 268.969541][T16748] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c001200"], 0x3c}}, 0x0) 05:14:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xb000, 0x10, 0x0}, 0x80) 05:14:53 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:53 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xc602, 0x10, 0x0}, 0x80) 05:14:53 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4(r0, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80, 0x800) fcntl$setpipe(r2, 0x407, 0x3fd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xed00, 0x10, 0x0}, 0x80) [ 269.048366][T16784] loop5: detected capacity change from 0 to 64 [ 269.061257][T16785] loop1: detected capacity change from 0 to 64 [ 269.076577][T16784] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 269.082052][T16789] loop4: detected capacity change from 0 to 64 05:14:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c0001"], 0x3c}}, 0x0) 05:14:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xff00, 0x10, 0x0}, 0x80) [ 269.108844][T16784] FAT-fs (loop5): Directory bread(block 1986) failed [ 269.120219][T16785] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 269.135508][T16784] FAT-fs (loop5): Directory bread(block 1987) failed [ 269.144223][T16797] loop3: detected capacity change from 0 to 64 [ 269.151084][T16784] FAT-fs (loop5): Directory bread(block 1988) failed [ 269.151858][T16789] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 269.161691][T16784] FAT-fs (loop5): Directory bread(block 1989) failed [ 269.174553][T16785] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 269.175900][T16789] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 269.182579][T16785] FAT-fs (loop1): Filesystem has been set read-only [ 269.192252][T16784] FAT-fs (loop5): Directory bread(block 1990) failed 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1ed6cc, 0x10, 0x0}, 0x80) 05:14:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 269.197694][T16789] FAT-fs (loop4): Filesystem has been set read-only [ 269.205449][T16797] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 269.215236][T16784] FAT-fs (loop5): Directory bread(block 1991) failed [ 269.232976][T16784] FAT-fs (loop5): Directory bread(block 1992) failed [ 269.240212][T16784] FAT-fs (loop5): Directory bread(block 1993) failed 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x200000, 0x10, 0x0}, 0x80) 05:14:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) [ 269.261719][T16797] FAT-fs (loop3): Directory bread(block 1986) failed [ 269.268987][T16784] FAT-fs (loop5): Directory bread(block 1994) failed [ 269.277182][T16784] FAT-fs (loop5): Directory bread(block 1995) failed [ 269.285395][T16808] loop1: detected capacity change from 0 to 64 [ 269.288876][T16797] FAT-fs (loop3): Directory bread(block 1987) failed [ 269.299047][T16797] FAT-fs (loop3): Directory bread(block 1988) failed 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1000000, 0x10, 0x0}, 0x80) 05:14:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x2000000, 0x10, 0x0}, 0x80) [ 269.319797][T16797] FAT-fs (loop3): Directory bread(block 1989) failed [ 269.325934][T16812] loop4: detected capacity change from 0 to 64 [ 269.331654][T16797] FAT-fs (loop3): Directory bread(block 1990) failed [ 269.340325][T16797] FAT-fs (loop3): Directory bread(block 1991) failed [ 269.354034][ T6282] Buffer I/O error on dev loop5, logical block 0, async page read [ 269.365693][T16797] FAT-fs (loop3): Directory bread(block 1992) failed [ 269.367310][T16808] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 269.373110][T16797] FAT-fs (loop3): Directory bread(block 1993) failed [ 269.389465][T16797] FAT-fs (loop3): Directory bread(block 1994) failed [ 269.392010][T16812] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 269.396396][T16797] FAT-fs (loop3): Directory bread(block 1995) failed [ 269.412233][T16812] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) 05:14:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 269.420596][T16812] FAT-fs (loop4): Filesystem has been set read-only [ 269.430320][ T6282] Buffer I/O error on dev loop5, logical block 0, async page read [ 269.433347][T16808] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 269.446260][T16808] FAT-fs (loop1): Filesystem has been set read-only [ 269.455019][T16821] loop5: detected capacity change from 0 to 64 [ 269.463990][T16821] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 269.475194][T16821] FAT-fs (loop5): Directory bread(block 1986) failed [ 269.482085][T16821] FAT-fs (loop5): Directory bread(block 1987) failed [ 269.491892][T16821] FAT-fs (loop5): Directory bread(block 1988) failed [ 269.506382][T16821] FAT-fs (loop5): Directory bread(block 1989) failed [ 269.517714][T16821] FAT-fs (loop5): Directory bread(block 1990) failed [ 269.526552][T16821] FAT-fs (loop5): Directory bread(block 1991) failed [ 269.533330][T16821] FAT-fs (loop5): Directory bread(block 1992) failed [ 269.540140][T16821] FAT-fs (loop5): Directory bread(block 1993) failed [ 269.547652][T16821] FAT-fs (loop5): Directory bread(block 1994) failed [ 269.554334][T16821] FAT-fs (loop5): Directory bread(block 1995) failed 05:14:54 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4(r0, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80, 0x800) fcntl$setpipe(r2, 0x407, 0x3fd) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) pipe(&(0x7f00000000c0)) (async) accept4(r0, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80, 0x800) (async) fcntl$setpipe(r2, 0x407, 0x3fd) (async) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) (async) write(r1, &(0x7f0000000100)='=', 0x1) (async) 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x3000000, 0x10, 0x0}, 0x80) 05:14:54 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c0001"], 0x3c}}, 0x0) 05:14:54 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) 05:14:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:54 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x4000000, 0x10, 0x0}, 0x80) [ 269.961531][T16831] loop5: detected capacity change from 0 to 64 [ 269.969953][T16830] loop1: detected capacity change from 0 to 64 [ 269.974721][T16828] loop4: detected capacity change from 0 to 64 [ 269.976868][T16834] loop3: detected capacity change from 0 to 64 [ 269.995821][T16831] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x5000000, 0x10, 0x0}, 0x80) [ 270.020821][T16834] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 270.028255][T16831] FAT-fs (loop5): Directory bread(block 1986) failed [ 270.037063][T16830] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 270.037105][T16828] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 270.038446][T16828] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 270.047203][T16831] FAT-fs (loop5): Directory bread(block 1987) failed 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x6000000, 0x10, 0x0}, 0x80) [ 270.055728][T16828] FAT-fs (loop4): Filesystem has been set read-only [ 270.073996][T16831] FAT-fs (loop5): Directory bread(block 1988) failed [ 270.087323][T16830] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 270.088944][T16834] FAT-fs (loop3): Directory bread(block 1986) failed [ 270.095431][T16830] FAT-fs (loop1): Filesystem has been set read-only [ 270.099642][T16831] FAT-fs (loop5): Directory bread(block 1989) failed 05:14:54 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4(r0, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80, 0x800) fcntl$setpipe(r2, 0x407, 0x3fd) (async) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x7000000, 0x10, 0x0}, 0x80) [ 270.110735][T16834] FAT-fs (loop3): Directory bread(block 1987) failed [ 270.116844][T16831] FAT-fs (loop5): Directory bread(block 1990) failed [ 270.132867][T16834] FAT-fs (loop3): Directory bread(block 1988) failed [ 270.136782][T16831] FAT-fs (loop5): Directory bread(block 1991) failed [ 270.142409][T16834] FAT-fs (loop3): Directory bread(block 1989) failed [ 270.155334][T16834] FAT-fs (loop3): Directory bread(block 1990) failed [ 270.163767][T16831] FAT-fs (loop5): Directory bread(block 1992) failed 05:14:54 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x8000000, 0x10, 0x0}, 0x80) 05:14:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 270.163944][T16834] FAT-fs (loop3): Directory bread(block 1991) failed [ 270.179750][T16834] FAT-fs (loop3): Directory bread(block 1992) failed [ 270.180285][T16831] FAT-fs (loop5): Directory bread(block 1993) failed [ 270.191656][T16834] FAT-fs (loop3): Directory bread(block 1993) failed [ 270.202436][T16831] FAT-fs (loop5): Directory bread(block 1994) failed [ 270.205660][T16834] FAT-fs (loop3): Directory bread(block 1994) failed 05:14:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x9000000, 0x10, 0x0}, 0x80) 05:14:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c0001"], 0x3c}}, 0x0) 05:14:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) [ 270.222024][T16834] FAT-fs (loop3): Directory bread(block 1995) failed [ 270.227883][T16831] FAT-fs (loop5): Directory bread(block 1995) failed [ 270.246338][T16860] loop1: detected capacity change from 0 to 64 05:14:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xa000000, 0x10, 0x0}, 0x80) 05:14:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xb000000, 0x10, 0x0}, 0x80) 05:14:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100"], 0x3c}}, 0x0) [ 270.279230][T16860] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 270.293651][T16864] loop4: detected capacity change from 0 to 64 [ 270.305812][T16860] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 270.314123][T16860] FAT-fs (loop1): Filesystem has been set read-only 05:14:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 270.349014][T16864] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 270.369153][T16873] loop3: detected capacity change from 0 to 64 [ 270.371101][T16877] loop5: detected capacity change from 0 to 64 [ 270.383016][T16864] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 270.391347][T16864] FAT-fs (loop4): Filesystem has been set read-only [ 270.414023][T16877] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 270.424955][T16873] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 270.436579][T16877] FAT-fs (loop5): Directory bread(block 1986) failed [ 270.446636][T16877] FAT-fs (loop5): Directory bread(block 1987) failed [ 270.456230][T16873] FAT-fs (loop3): Directory bread(block 1986) failed [ 270.460860][T16877] FAT-fs (loop5): Directory bread(block 1988) failed [ 270.466928][T16873] FAT-fs (loop3): Directory bread(block 1987) failed [ 270.475574][T16877] FAT-fs (loop5): Directory bread(block 1989) failed [ 270.477559][T16873] FAT-fs (loop3): Directory bread(block 1988) failed [ 270.486067][T16877] FAT-fs (loop5): Directory bread(block 1990) failed [ 270.491500][T16873] FAT-fs (loop3): Directory bread(block 1989) failed [ 270.498301][T16877] FAT-fs (loop5): Directory bread(block 1991) failed [ 270.498400][T16877] FAT-fs (loop5): Directory bread(block 1992) failed [ 270.505324][T16873] FAT-fs (loop3): Directory bread(block 1990) failed [ 270.513241][T16877] FAT-fs (loop5): Directory bread(block 1993) failed [ 270.519361][T16873] FAT-fs (loop3): Directory bread(block 1991) failed [ 270.526387][T16877] FAT-fs (loop5): Directory bread(block 1994) failed [ 270.532943][T16873] FAT-fs (loop3): Directory bread(block 1992) failed [ 270.541206][T16877] FAT-fs (loop5): Directory bread(block 1995) failed [ 270.546989][T16873] FAT-fs (loop3): Directory bread(block 1993) failed [ 270.568985][T16873] FAT-fs (loop3): Directory bread(block 1994) failed [ 270.576157][T16873] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xc000000, 0x10, 0x0}, 0x80) 05:14:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) 05:14:55 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:55 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x1) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) r2 = socket(0x10, 0x2, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1e4}, 0x1, 0x0, 0x0, 0x4090}, 0xdb20813475dc88a2) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f00000005c0)=@req={0x400, 0x8, 0x3f, 0xa2}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x1f, 0x8) fcntl$setpipe(r0, 0x407, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x112, 0x70bd2b, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8880}, 0x22000084) 05:14:55 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100"], 0x3c}}, 0x0) 05:14:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xd000000, 0x10, 0x0}, 0x80) [ 270.989268][T16886] loop4: detected capacity change from 0 to 64 [ 270.989839][T16885] loop1: detected capacity change from 0 to 64 [ 271.010961][T16888] loop5: detected capacity change from 0 to 64 [ 271.018000][T16891] loop3: detected capacity change from 0 to 64 [ 271.020296][T16886] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xe000000, 0x10, 0x0}, 0x80) [ 271.039139][T16886] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 271.047682][T16886] FAT-fs (loop4): Filesystem has been set read-only [ 271.068489][T16891] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 271.079857][T16888] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x10000000, 0x10, 0x0}, 0x80) 05:14:55 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x10020000, 0x10, 0x0}, 0x80) [ 271.089841][T16891] FAT-fs (loop3): Directory bread(block 1986) failed [ 271.096973][T16885] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 271.119544][T16891] FAT-fs (loop3): Directory bread(block 1987) failed [ 271.128082][T16885] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) 05:14:55 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) [ 271.128429][T16891] FAT-fs (loop3): Directory bread(block 1988) failed [ 271.136062][T16885] FAT-fs (loop1): Filesystem has been set read-only [ 271.156180][T16891] FAT-fs (loop3): Directory bread(block 1989) failed [ 271.161333][T16888] FAT-fs (loop5): Directory bread(block 1986) failed [ 271.170750][T16888] FAT-fs (loop5): Directory bread(block 1987) failed [ 271.173348][T16906] loop4: detected capacity change from 0 to 64 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x11000000, 0x10, 0x0}, 0x80) 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x12000000, 0x10, 0x0}, 0x80) [ 271.179591][T16888] FAT-fs (loop5): Directory bread(block 1988) failed [ 271.188431][T16891] FAT-fs (loop3): Directory bread(block 1990) failed [ 271.204120][T16888] FAT-fs (loop5): Directory bread(block 1989) failed [ 271.212155][T16891] FAT-fs (loop3): Directory bread(block 1991) failed [ 271.220078][T16888] FAT-fs (loop5): Directory bread(block 1990) failed [ 271.227093][T16906] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x18000000, 0x10, 0x0}, 0x80) [ 271.235580][T16888] FAT-fs (loop5): Directory bread(block 1991) failed [ 271.241173][T16891] FAT-fs (loop3): Directory bread(block 1992) failed [ 271.250599][T16906] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 271.258608][T16906] FAT-fs (loop4): Filesystem has been set read-only [ 271.262418][T16888] FAT-fs (loop5): Directory bread(block 1992) failed [ 271.273459][T16891] FAT-fs (loop3): Directory bread(block 1993) failed [ 271.279765][T16888] FAT-fs (loop5): Directory bread(block 1993) failed [ 271.281194][T16891] FAT-fs (loop3): Directory bread(block 1994) failed [ 271.288037][T16888] FAT-fs (loop5): Directory bread(block 1994) failed [ 271.298459][T16891] FAT-fs (loop3): Directory bread(block 1995) failed [ 271.304258][T16914] loop1: detected capacity change from 0 to 64 [ 271.321019][T16888] FAT-fs (loop5): Directory bread(block 1995) failed 05:14:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 271.334058][T16914] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 271.352530][T16914] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 271.360699][T16914] FAT-fs (loop1): Filesystem has been set read-only [ 271.383427][ T8029] blk_print_req_error: 17 callbacks suppressed [ 271.383441][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 271.427853][ T6282] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 271.428353][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 271.446544][ T8029] Buffer I/O error on dev loop5, logical block 0, async page read 05:14:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x20000000, 0x10, 0x0}, 0x80) 05:14:56 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x1) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) write(r1, &(0x7f0000000100)='=', 0x1) r2 = socket(0x10, 0x2, 0x0) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="e40100003000000228bd7000ffdbdf2500000000780001f8730000000b000100736b626d6f6400001c0002800a000400aaaaaaaaaabb00000a000400bbbbbbbbbbbb00002e000600614667aded32e407c6c62960135c30e90c517112b064599531533dac1331a834cc7cf18e3f615127a64700000c00070000000000000000000c0008000100000000000000040001009c0003000f00010074756e6e656c5f6b657900001400028005000a000000000008000300ac1414bb7800060014d48117c45868d2175d5d76079693e3f32f2fd3c2bd42871faafb072d644b1f554ff2394fe0c11c8b922d8c626c5d158e49ad3d92e23bb7595dbd10e42a5c4e2ede246fe98942f5ce404a8857578e24d941f003252c00000c00070000000000010000000c0008000100000002000000b80014000700010063740000040002808d00060099ba33a671c37019814273cafabd61520cc748ffa2b2fb87bfa455d8100d0befa819e19ece204e2a61b8f073abcde813fd0a238de36346e7a58a8b03ec19107713af8d3861d53234fd047b78be4ee0c13a80e449a04d25c02858768412c1918a178db87ff59e8645cee92d8afe96aab19e36ad430f010aa5ade7d7988bc4f945eddf75380091b95d9b0000000c00070001000000000000000c0008000200000002000000"], 0x1e4}, 0x1, 0x0, 0x0, 0x4090}, 0xdb20813475dc88a2) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f00000005c0)=@req={0x400, 0x8, 0x3f, 0xa2}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x1f, 0x8) fcntl$setpipe(r0, 0x407, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x112, 0x70bd2b, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8880}, 0x22000084) pipe(&(0x7f0000000000)) (async) fcntl$setpipe(r1, 0x407, 0x1) (async) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) (async) write(r1, &(0x7f0000000100)='=', 0x1) (async) socket(0x10, 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) (async) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1e4}, 0x1, 0x0, 0x0, 0x4090}, 0xdb20813475dc88a2) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) (async) socket(0x10, 0x2, 0x0) (async) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) (async) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f00000005c0)=@req={0x400, 0x8, 0x3f, 0xa2}, 0x10) (async) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x1f, 0x8) (async) fcntl$setpipe(r0, 0x407, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x112, 0x70bd2b, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8880}, 0x22000084) (async) 05:14:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100"], 0x3c}}, 0x0) 05:14:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x25000000, 0x10, 0x0}, 0x80) [ 271.855651][T16926] loop5: detected capacity change from 0 to 64 [ 271.859944][T16930] loop4: detected capacity change from 0 to 64 [ 271.867112][T16923] loop3: detected capacity change from 0 to 64 [ 271.876479][T16928] loop1: detected capacity change from 0 to 64 [ 271.892658][T16923] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x40000000, 0x10, 0x0}, 0x80) [ 271.917737][T16930] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 271.932049][T16928] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 271.933443][T16923] FAT-fs (loop3): Directory bread(block 1986) failed [ 271.943219][T16928] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 271.954186][T16930] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x48000000, 0x10, 0x0}, 0x80) 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x4c000000, 0x10, 0x0}, 0x80) 05:14:56 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x1) write$eventfd(r1, &(0x7f0000000240), 0xffffff14) (async) write(r1, &(0x7f0000000100)='=', 0x1) (async, rerun: 32) r2 = socket(0x10, 0x2, 0x0) (async, rerun: 32) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1e4}, 0x1, 0x0, 0x0, 0x4090}, 0xdb20813475dc88a2) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) (async) r4 = socket(0x10, 0x2, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x140}}, 0x0) (async) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f00000005c0)=@req={0x400, 0x8, 0x3f, 0xa2}, 0x10) (async, rerun: 32) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000040)=0x1f, 0x8) (async, rerun: 32) fcntl$setpipe(r0, 0x407, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) sendmsg$SMC_PNETID_ADD(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, 0x0, 0x112, 0x70bd2b, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8880}, 0x22000084) [ 271.957363][T16928] FAT-fs (loop1): Filesystem has been set read-only [ 271.964784][T16930] FAT-fs (loop4): Filesystem has been set read-only [ 271.977075][T16923] FAT-fs (loop3): Directory bread(block 1987) failed [ 271.985419][T16923] FAT-fs (loop3): Directory bread(block 1988) failed [ 271.993746][T16923] FAT-fs (loop3): Directory bread(block 1989) failed [ 272.003152][T16923] FAT-fs (loop3): Directory bread(block 1990) failed [ 272.013509][T16923] FAT-fs (loop3): Directory bread(block 1991) failed [ 272.024541][T16923] FAT-fs (loop3): Directory bread(block 1992) failed [ 272.026389][ T6282] I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 272.040470][T16923] FAT-fs (loop3): Directory bread(block 1993) failed [ 272.040814][ T6282] Buffer I/O error on dev loop1, logical block 2, async page read [ 272.052012][T16923] FAT-fs (loop3): Directory bread(block 1994) failed 05:14:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) 05:14:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x68000000, 0x10, 0x0}, 0x80) [ 272.059759][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 272.066412][T16923] FAT-fs (loop3): Directory bread(block 1995) failed [ 272.083030][T16963] loop5: detected capacity change from 0 to 64 [ 272.113855][T16972] loop1: detected capacity change from 0 to 64 [ 272.121075][ T6282] I/O error, dev loop1, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 272.130489][ T6282] Buffer I/O error on dev loop1, logical block 3, async page read [ 272.141429][T16972] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 272.146245][T16976] loop4: detected capacity change from 0 to 64 05:14:56 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) 05:14:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x6c000000, 0x10, 0x0}, 0x80) 05:14:56 executing program 2: pipe(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20fffff) creat(&(0x7f0000000080)='./file0\x00', 0x103) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) fcntl$setlease(r0, 0x400, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000100)="dc65b91f509ebb1e96a19562e38f86824aa965cd55818ff6a06fc63e6e2fdf210e88e1a0b364789fcd50e7582c180dd4a316dc2f86932eb0424f9440029ec22a29c6d53791b47f19146ca88314683f292084b31037ae2d7b8cae94febe22ceb5ac6671aeeeca1f108eaf79025483ce9bf016448e22481c35486ccf9cbd4b14fe407c0215199dec177040ed9e9b", 0x8d) pipe(&(0x7f0000000000)) 05:14:56 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x74000000, 0x10, 0x0}, 0x80) 05:14:57 executing program 2: pipe(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20fffff) creat(&(0x7f0000000080)='./file0\x00', 0x103) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) fcntl$setlease(r0, 0x400, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) write(0xffffffffffffffff, &(0x7f0000000100)="dc65b91f509ebb1e96a19562e38f86824aa965cd55818ff6a06fc63e6e2fdf210e88e1a0b364789fcd50e7582c180dd4a316dc2f86932eb0424f9440029ec22a29c6d53791b47f19146ca88314683f292084b31037ae2d7b8cae94febe22ceb5ac6671aeeeca1f108eaf79025483ce9bf016448e22481c35486ccf9cbd4b14fe407c0215199dec177040ed9e9b", 0x8d) pipe(&(0x7f0000000000)) pipe(0xffffffffffffffff) (async) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20fffff) (async) creat(&(0x7f0000000080)='./file0\x00', 0x103) (async) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) (async) inotify_init1(0x800) (async) fcntl$setown(r0, 0x8, 0xffffffffffffffff) (async) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) (async) fcntl$setlease(r0, 0x400, 0x2) (async) dup2(0xffffffffffffffff, 0xffffffffffffffff) (async) write(0xffffffffffffffff, &(0x7f0000000100)="dc65b91f509ebb1e96a19562e38f86824aa965cd55818ff6a06fc63e6e2fdf210e88e1a0b364789fcd50e7582c180dd4a316dc2f86932eb0424f9440029ec22a29c6d53791b47f19146ca88314683f292084b31037ae2d7b8cae94febe22ceb5ac6671aeeeca1f108eaf79025483ce9bf016448e22481c35486ccf9cbd4b14fe407c0215199dec177040ed9e9b", 0x8d) (async) pipe(&(0x7f0000000000)) (async) [ 272.152890][T16972] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 272.165249][T16972] FAT-fs (loop1): Filesystem has been set read-only 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x7a000000, 0x10, 0x0}, 0x80) 05:14:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) [ 272.208827][T16976] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 272.233605][T16976] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 272.241810][T16976] FAT-fs (loop4): Filesystem has been set read-only 05:14:57 executing program 2: pipe(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x20fffff) creat(&(0x7f0000000080)='./file0\x00', 0x103) (async) write$eventfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) (async) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) fcntl$setlease(r0, 0x400, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) (async) write(0xffffffffffffffff, &(0x7f0000000100)="dc65b91f509ebb1e96a19562e38f86824aa965cd55818ff6a06fc63e6e2fdf210e88e1a0b364789fcd50e7582c180dd4a316dc2f86932eb0424f9440029ec22a29c6d53791b47f19146ca88314683f292084b31037ae2d7b8cae94febe22ceb5ac6671aeeeca1f108eaf79025483ce9bf016448e22481c35486ccf9cbd4b14fe407c0215199dec177040ed9e9b", 0x8d) (async) pipe(&(0x7f0000000000)) [ 272.252560][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 272.257118][ T6282] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 272.274640][T16998] loop5: detected capacity change from 0 to 64 [ 272.290466][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 272.295269][T17000] loop3: detected capacity change from 0 to 64 [ 272.299796][ T8029] Buffer I/O error on dev loop5, logical block 0, async page read [ 272.302780][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 272.323135][ T8029] Buffer I/O error on dev loop5, logical block 0, async page read 05:14:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x85ffffff, 0x10, 0x0}, 0x80) 05:14:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xb0000000, 0x10, 0x0}, 0x80) [ 272.350160][T17000] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 272.381679][T17012] loop1: detected capacity change from 0 to 64 [ 272.394083][T17011] loop5: detected capacity change from 0 to 64 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xc6020000, 0x10, 0x0}, 0x80) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xccd61e00, 0x10, 0x0}, 0x80) 05:14:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 272.410102][T17015] loop4: detected capacity change from 0 to 64 [ 272.423047][T17012] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 272.440247][T17000] FAT-fs (loop3): Directory bread(block 1986) failed [ 272.452101][T17000] FAT-fs (loop3): Directory bread(block 1987) failed [ 272.466901][T17024] loop5: detected capacity change from 0 to 64 [ 272.468307][T17012] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 272.481421][T17012] FAT-fs (loop1): Filesystem has been set read-only [ 272.489476][T17000] FAT-fs (loop3): Directory bread(block 1988) failed [ 272.499628][T17000] FAT-fs (loop3): Directory bread(block 1989) failed [ 272.504336][T17015] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 272.508975][T17000] FAT-fs (loop3): Directory bread(block 1990) failed [ 272.519468][T17015] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 272.523774][T17000] FAT-fs (loop3): Directory bread(block 1991) failed [ 272.530551][T17015] FAT-fs (loop4): Filesystem has been set read-only [ 272.538614][T17000] FAT-fs (loop3): Directory bread(block 1992) failed [ 272.551477][T17000] FAT-fs (loop3): Directory bread(block 1993) failed [ 272.560532][T17000] FAT-fs (loop3): Directory bread(block 1994) failed 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xed000000, 0x10, 0x0}, 0x80) 05:14:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYBLOB], 0x3c}}, 0x0) 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 272.569844][T17000] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xff000000, 0x10, 0x0}, 0x80) 05:14:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 272.632333][T17030] loop5: detected capacity change from 0 to 64 [ 272.640442][T17034] loop1: detected capacity change from 0 to 64 [ 272.640506][T17036] loop4: detected capacity change from 0 to 64 [ 272.661424][ T6261] Buffer I/O error on dev loop3, logical block 0, async page read 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffff85, 0x10, 0x0}, 0x80) 05:14:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYBLOB], 0x3c}}, 0x0) [ 272.677947][T17036] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 272.699336][T17036] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 272.707509][T17036] FAT-fs (loop4): Filesystem has been set read-only 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2, 0x0}, 0x80) 05:14:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x3, 0x0}, 0x80) [ 272.726457][T17034] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 272.737497][ T6261] Buffer I/O error on dev loop3, logical block 0, async page read [ 272.742691][T17034] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 272.753481][T17034] FAT-fs (loop1): Filesystem has been set read-only 05:14:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYBLOB], 0x3c}}, 0x0) 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) 05:14:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x4, 0x0}, 0x80) 05:14:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) [ 272.844675][T17067] loop3: detected capacity change from 0 to 64 [ 272.859776][T17069] loop4: detected capacity change from 0 to 64 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x5, 0x0}, 0x80) [ 272.894913][T17069] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 272.906159][T17077] loop1: detected capacity change from 0 to 64 [ 272.917687][T17069] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 272.925648][T17069] FAT-fs (loop4): Filesystem has been set read-only [ 272.932661][T17067] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYBLOB], 0x3c}}, 0x0) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x6, 0x0}, 0x80) 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) [ 272.933615][T17076] FAT-fs (loop5): bogus number of reserved sectors [ 272.948589][T17076] FAT-fs (loop5): Can't find a valid FAT filesystem [ 272.958923][T17077] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 272.972285][T17067] FAT-fs (loop3): Directory bread(block 1986) failed [ 272.980612][T17077] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 272.988616][T17077] FAT-fs (loop1): Filesystem has been set read-only [ 272.997055][T17067] FAT-fs (loop3): Directory bread(block 1987) failed [ 273.005219][T17067] FAT-fs (loop3): Directory bread(block 1988) failed [ 273.012353][T17067] FAT-fs (loop3): Directory bread(block 1989) failed [ 273.019454][T17067] FAT-fs (loop3): Directory bread(block 1990) failed [ 273.027113][T17067] FAT-fs (loop3): Directory bread(block 1991) failed 05:14:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x7, 0x0}, 0x80) [ 273.045515][T17067] FAT-fs (loop3): Directory bread(block 1992) failed [ 273.057987][T17067] FAT-fs (loop3): Directory bread(block 1993) failed [ 273.076346][T17067] FAT-fs (loop3): Directory bread(block 1994) failed [ 273.082200][T17093] loop1: detected capacity change from 0 to 64 [ 273.083904][T17067] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:14:57 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x3c}}, 0x0) 05:14:57 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x8, 0x0}, 0x80) 05:14:57 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0}, 0x80) [ 273.100816][T17093] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 273.111686][T17093] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 273.119948][T17093] FAT-fs (loop1): Filesystem has been set read-only 05:14:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x3c}}, 0x0) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xa, 0x0}, 0x80) [ 273.159036][T17101] loop4: detected capacity change from 0 to 64 [ 273.175578][T17099] FAT-fs (loop5): bogus number of reserved sectors [ 273.182361][T17099] FAT-fs (loop5): Can't find a valid FAT filesystem [ 273.197128][T17101] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 273.216225][T17109] loop1: detected capacity change from 0 to 64 [ 273.222946][T17101] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 273.230451][T17111] loop3: detected capacity change from 0 to 64 [ 273.231023][T17101] FAT-fs (loop4): Filesystem has been set read-only 05:14:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 273.270585][T17109] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 273.277524][T17111] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 273.293309][T17109] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 273.301580][T17109] FAT-fs (loop1): Filesystem has been set read-only [ 273.306389][T17111] FAT-fs (loop3): Directory bread(block 1986) failed 05:14:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xb, 0x0}, 0x80) 05:14:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 273.315470][T17111] FAT-fs (loop3): Directory bread(block 1987) failed [ 273.323813][T17111] FAT-fs (loop3): Directory bread(block 1988) failed [ 273.324435][T17118] FAT-fs (loop5): bogus number of reserved sectors [ 273.337748][T17118] FAT-fs (loop5): Can't find a valid FAT filesystem [ 273.339924][T17111] FAT-fs (loop3): Directory bread(block 1989) failed 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xc, 0x0}, 0x80) [ 273.373799][T17111] FAT-fs (loop3): Directory bread(block 1990) failed [ 273.384511][T17124] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 273.386432][T17111] FAT-fs (loop3): Directory bread(block 1991) failed [ 273.403292][T17111] FAT-fs (loop3): Directory bread(block 1992) failed [ 273.403488][T17128] loop1: detected capacity change from 0 to 64 [ 273.410557][T17111] FAT-fs (loop3): Directory bread(block 1993) failed 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xd, 0x0}, 0x80) [ 273.430288][T17111] FAT-fs (loop3): Directory bread(block 1994) failed [ 273.431805][T17127] loop4: detected capacity change from 0 to 64 [ 273.437860][T17111] FAT-fs (loop3): Directory bread(block 1995) failed [ 273.463125][T17128] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 273.480507][T17128] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 273.488421][T17128] FAT-fs (loop1): Filesystem has been set read-only [ 273.499647][T17127] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 273.516915][T17127] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 273.524541][T17137] loop5: detected capacity change from 0 to 64 05:14:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB], 0x3c}}, 0x0) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xe, 0x0}, 0x80) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x11, 0x0}, 0x80) 05:14:58 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) [ 273.525155][T17127] FAT-fs (loop4): Filesystem has been set read-only [ 273.543050][T17137] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 273.564102][T17137] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 273.573003][T17137] FAT-fs (loop5): Filesystem has been set read-only 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x12, 0x0}, 0x80) 05:14:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x18, 0x0}, 0x80) 05:14:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 273.610002][T17147] loop1: detected capacity change from 0 to 64 [ 273.633842][T17152] loop4: detected capacity change from 0 to 64 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:58 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 273.662177][T17152] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 273.662935][T17156] loop3: detected capacity change from 0 to 64 [ 273.673486][T17152] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 273.686338][T17152] FAT-fs (loop4): Filesystem has been set read-only [ 273.691292][T17160] loop5: detected capacity change from 0 to 64 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x29, 0x0}, 0x80) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x30, 0x0}, 0x80) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:58 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 273.716403][T17156] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 273.737485][T17166] loop1: detected capacity change from 0 to 64 [ 273.750357][T17160] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x85, 0x0}, 0x80) [ 273.784928][T17160] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 273.792600][T17156] FAT-fs (loop3): Directory bread(block 1986) failed [ 273.794049][T17160] FAT-fs (loop5): Filesystem has been set read-only [ 273.810339][T17173] loop4: detected capacity change from 0 to 64 [ 273.818414][T17156] FAT-fs (loop3): Directory bread(block 1987) failed [ 273.820183][T17173] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:58 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 273.825611][T17156] FAT-fs (loop3): Directory bread(block 1988) failed [ 273.841928][T17156] FAT-fs (loop3): Directory bread(block 1989) failed [ 273.858253][T17156] FAT-fs (loop3): Directory bread(block 1990) failed [ 273.868065][T17178] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 273.875892][T17156] FAT-fs (loop3): Directory bread(block 1991) failed [ 273.886903][T17173] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 273.891226][T17156] FAT-fs (loop3): Directory bread(block 1992) failed [ 273.894945][T17173] FAT-fs (loop4): Filesystem has been set read-only [ 273.914985][T17180] loop1: detected capacity change from 0 to 64 [ 273.921894][T17156] FAT-fs (loop3): Directory bread(block 1993) failed 05:14:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x95, 0x0}, 0x80) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:58 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 273.935599][T17156] FAT-fs (loop3): Directory bread(block 1994) failed [ 273.943103][T17156] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x1001, 0x0}, 0x80) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) [ 273.977794][T17188] loop4: detected capacity change from 0 to 64 [ 273.984704][T17183] loop5: detected capacity change from 0 to 64 [ 274.012977][T17192] loop1: detected capacity change from 0 to 64 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x2000007e, 0x0}, 0x80) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0xffffffd4, 0x0}, 0x80) 05:14:58 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:58 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:14:58 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 274.023042][T17183] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 274.036925][T17183] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 274.046149][T17183] FAT-fs (loop5): Filesystem has been set read-only [ 274.050242][T17193] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 05:14:58 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2}, 0x80) 05:14:58 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) [ 274.113069][T17203] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 274.126506][T17206] loop5: detected capacity change from 0 to 64 [ 274.138867][T17210] loop1: detected capacity change from 0 to 64 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3}, 0x80) 05:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 274.165618][T17214] loop4: detected capacity change from 0 to 64 [ 274.179952][T17206] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 274.186228][T17213] loop3: detected capacity change from 0 to 64 [ 274.192881][T17206] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 274.204491][T17206] FAT-fs (loop5): Filesystem has been set read-only 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4}, 0x80) 05:14:59 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x5}, 0x80) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6}, 0x80) [ 274.237251][T17219] loop1: detected capacity change from 0 to 64 [ 274.246871][T17213] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 274.261380][T17224] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:14:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7}, 0x80) [ 274.299590][T17213] FAT-fs (loop3): Directory bread(block 1986) failed [ 274.319335][T17213] FAT-fs (loop3): Directory bread(block 1987) failed [ 274.320984][T17233] loop4: detected capacity change from 0 to 64 [ 274.326305][T17213] FAT-fs (loop3): Directory bread(block 1988) failed 05:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 274.355825][T17235] loop5: detected capacity change from 0 to 64 [ 274.359667][T17213] FAT-fs (loop3): Directory bread(block 1989) failed [ 274.382000][T17213] FAT-fs (loop3): Directory bread(block 1990) failed [ 274.389773][T17235] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 274.394717][T17213] FAT-fs (loop3): Directory bread(block 1991) failed [ 274.402837][T17235] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 274.406094][T17213] FAT-fs (loop3): Directory bread(block 1992) failed [ 274.406214][T17213] FAT-fs (loop3): Directory bread(block 1993) failed [ 274.415047][T17235] FAT-fs (loop5): Filesystem has been set read-only [ 274.435956][T17213] FAT-fs (loop3): Directory bread(block 1994) failed [ 274.443807][T17213] FAT-fs (loop3): Directory bread(block 1995) failed 05:14:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8}, 0x80) 05:14:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:14:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 274.454073][ T6282] Buffer I/O error on dev loop5, logical block 2, async page read [ 274.462375][ T6282] Buffer I/O error on dev loop5, logical block 3, async page read [ 274.474875][ T6282] Buffer I/O error on dev loop5, logical block 4, async page read [ 274.485945][ T6282] Buffer I/O error on dev loop5, logical block 5, async page read [ 274.494842][ T6282] Buffer I/O error on dev loop5, logical block 6, async page read 05:14:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x9}, 0x80) 05:14:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 274.510384][T17251] loop4: detected capacity change from 0 to 64 [ 274.523574][ T6282] Buffer I/O error on dev loop5, logical block 7, async page read [ 274.534508][T17253] loop5: detected capacity change from 0 to 64 05:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xa}, 0x80) 05:14:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 274.552509][T17255] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 274.566657][ T6282] Buffer I/O error on dev loop5, logical block 0, async page read [ 274.584950][ T6282] Buffer I/O error on dev loop5, logical block 1, async page read [ 274.595624][ T6282] Buffer I/O error on dev loop5, logical block 2, async page read 05:14:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb}, 0x80) [ 274.610190][T17266] FAT-fs (loop1): bogus number of reserved sectors [ 274.616832][T17266] FAT-fs (loop1): Can't find a valid FAT filesystem [ 274.624471][T17263] loop3: detected capacity change from 0 to 64 [ 274.631507][T17270] loop4: detected capacity change from 0 to 64 [ 274.649187][T17253] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xc}, 0x80) [ 274.659573][T17263] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 274.671482][T17253] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 274.683252][T17253] FAT-fs (loop5): Filesystem has been set read-only [ 274.693034][T17273] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:14:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffff", 0x6, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xd}, 0x80) 05:14:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) 05:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xe}, 0x80) [ 274.709622][T17263] FAT-fs (loop3): Directory bread(block 1986) failed [ 274.721615][T17263] FAT-fs (loop3): Directory bread(block 1987) failed [ 274.746350][T17263] FAT-fs (loop3): Directory bread(block 1988) failed 05:14:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) [ 274.757053][T17263] FAT-fs (loop3): Directory bread(block 1989) failed [ 274.766643][T17284] FAT-fs (loop1): bogus number of reserved sectors [ 274.769284][T17263] FAT-fs (loop3): Directory bread(block 1990) failed [ 274.773243][T17284] FAT-fs (loop1): Can't find a valid FAT filesystem [ 274.787116][T17263] FAT-fs (loop3): Directory bread(block 1991) failed [ 274.802283][T17289] loop5: detected capacity change from 0 to 64 [ 274.808380][T17263] FAT-fs (loop3): Directory bread(block 1992) failed [ 274.821410][T17263] FAT-fs (loop3): Directory bread(block 1993) failed [ 274.829383][T17263] FAT-fs (loop3): Directory bread(block 1994) failed [ 274.836340][T17263] FAT-fs (loop3): Directory bread(block 1995) failed [ 274.844241][T17289] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffff", 0x6, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x10}, 0x80) 05:14:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x11}, 0x80) [ 274.855391][T17289] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 274.864494][T17289] FAT-fs (loop5): Filesystem has been set read-only 05:14:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffff", 0x6, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x12}, 0x80) 05:14:59 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 274.914608][T17298] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 274.928261][T17302] FAT-fs (loop1): bogus number of reserved sectors [ 274.934822][T17302] FAT-fs (loop1): Can't find a valid FAT filesystem 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x18}, 0x80) 05:14:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x25}, 0x80) 05:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 274.976731][T17310] FAT-fs (loop4): bogus number of reserved sectors [ 274.980993][T17313] loop3: detected capacity change from 0 to 64 [ 274.983315][T17310] FAT-fs (loop4): Can't find a valid FAT filesystem [ 274.991764][T17314] loop5: detected capacity change from 0 to 64 05:14:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x48}, 0x80) [ 275.040812][T17314] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.052014][T17322] loop1: detected capacity change from 0 to 64 [ 275.053862][T17313] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 275.082304][T17322] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:14:59 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4c}, 0x80) 05:14:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffff", 0x6, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:14:59 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x68}, 0x80) 05:14:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 275.090769][T17314] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.100150][T17314] FAT-fs (loop5): Filesystem has been set read-only [ 275.105510][T17322] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.115376][T17322] FAT-fs (loop1): Filesystem has been set read-only [ 275.122083][T17329] FAT-fs (loop4): bogus number of reserved sectors [ 275.128708][T17329] FAT-fs (loop4): Can't find a valid FAT filesystem 05:15:00 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6c}, 0x80) 05:15:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) [ 275.167642][T17324] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 275.181975][T17337] loop1: detected capacity change from 0 to 64 [ 275.191515][T17339] loop5: detected capacity change from 0 to 64 [ 275.207344][T17337] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.209048][T17339] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.224151][T17337] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.230510][T17341] FAT-fs (loop4): bogus number of reserved sectors [ 275.234496][T17337] FAT-fs (loop1): Filesystem has been set read-only [ 275.241025][T17341] FAT-fs (loop4): Can't find a valid FAT filesystem [ 275.256708][T17339] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1) 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x74}, 0x80) 05:15:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7a}, 0x80) 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb0}, 0x80) [ 275.265597][T17339] FAT-fs (loop5): Filesystem has been set read-only 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xed}, 0x80) 05:15:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 275.315396][ T6282] Buffer I/O error on dev loop1, logical block 2, async page read [ 275.352568][T17355] loop3: detected capacity change from 0 to 64 [ 275.378938][T17361] loop4: detected capacity change from 0 to 64 [ 275.389226][T17364] loop1: detected capacity change from 0 to 64 [ 275.402977][T17365] loop5: detected capacity change from 0 to 64 [ 275.403148][T17364] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.425480][T17361] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.438922][T17361] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.443351][T17365] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.447514][T17361] FAT-fs (loop4): Filesystem has been set read-only [ 275.449751][T17364] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.457669][T17365] FAT-fs (loop5): error, invalid access to FAT (entry 0x000000f8) [ 275.463346][T17364] FAT-fs (loop1): Filesystem has been set read-only [ 275.467511][T17355] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.472188][T17365] FAT-fs (loop5): Filesystem has been set read-only [ 275.503390][T17355] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.512205][T17355] FAT-fs (loop3): Filesystem has been set read-only 05:15:00 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x210}, 0x80) 05:15:00 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) dup(r0) 05:15:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:00 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) read(r0, &(0x7f0000000100)=""/212, 0xd4) 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2c6}, 0x80) 05:15:00 executing program 3: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x200) [ 275.593795][T17377] loop1: detected capacity change from 0 to 64 [ 275.594167][T17375] loop4: detected capacity change from 0 to 64 [ 275.626474][T17375] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.633093][T17374] loop5: detected capacity change from 0 to 64 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x300}, 0x80) 05:15:00 executing program 3: open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) rename(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)='./file0\x00') [ 275.640913][T17375] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.650434][T17375] FAT-fs (loop4): Filesystem has been set read-only [ 275.661038][T17377] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.668226][T17374] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.683606][T17374] FAT-fs (loop5): error, invalid access to FAT (entry 0x000000f8) 05:15:00 executing program 3: connect$inet6(0xffffffffffffffff, &(0x7f0000001fc0)={0x18, 0x2}, 0xc) 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x500}, 0x80) 05:15:00 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:00 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:00 executing program 3: setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) [ 275.691797][T17374] FAT-fs (loop5): Filesystem has been set read-only [ 275.693353][T17377] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.707016][T17377] FAT-fs (loop1): Filesystem has been set read-only 05:15:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:00 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x600}, 0x80) [ 275.764329][T17400] loop4: detected capacity change from 0 to 64 [ 275.780876][T17402] loop5: detected capacity change from 0 to 64 [ 275.789513][T17400] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.802603][T17404] loop1: detected capacity change from 0 to 64 [ 275.811106][T17400] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.811226][T17402] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.819675][T17400] FAT-fs (loop4): Filesystem has been set read-only [ 275.819834][T17404] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 275.838427][T17402] FAT-fs (loop5): error, invalid access to FAT (entry 0x000000f8) [ 275.845042][T17404] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 275.852678][T17402] FAT-fs (loop5): Filesystem has been set read-only [ 275.861097][T17404] FAT-fs (loop1): Filesystem has been set read-only 05:15:01 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r0, 0xffffffffffffff9c) 05:15:01 executing program 3: pipe2(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x700}, 0x80) 05:15:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:01 executing program 3: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') mknod(&(0x7f0000000440)='./file0\x00', 0x0, 0x0) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x900}, 0x80) [ 276.482389][T17416] loop4: detected capacity change from 0 to 64 [ 276.485531][T17414] loop5: detected capacity change from 0 to 64 [ 276.499008][T17418] loop1: detected capacity change from 0 to 64 [ 276.505567][T17416] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:01 executing program 3: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') linkat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x400) 05:15:01 executing program 2: pipe2(&(0x7f0000000040), 0x400000) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xa00}, 0x80) [ 276.528053][T17416] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 276.536700][T17416] FAT-fs (loop4): Filesystem has been set read-only [ 276.546570][T17418] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 276.564093][T17418] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 276.572677][T17418] FAT-fs (loop1): Filesystem has been set read-only 05:15:01 executing program 2: ftruncate(0xffffffffffffffff, 0x0) 05:15:01 executing program 3: renameat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00') 05:15:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb00}, 0x80) [ 276.579669][T17414] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 276.617303][T17414] FAT-fs (loop5): error, invalid access to FAT (entry 0x00fffff8) [ 276.625367][T17414] FAT-fs (loop5): Filesystem has been set read-only 05:15:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:01 executing program 3: getsockname(0xffffffffffffff9c, 0x0, 0x0) 05:15:01 executing program 2: pipe2(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 05:15:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fff", 0x5, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xc00}, 0x80) [ 276.651009][T17440] loop4: detected capacity change from 0 to 64 [ 276.664102][T17440] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 276.673554][T17440] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 276.682941][T17440] FAT-fs (loop4): Filesystem has been set read-only 05:15:01 executing program 2: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) 05:15:01 executing program 3: getgroups(0x1, &(0x7f00000008c0)=[0x0]) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xd00}, 0x80) 05:15:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500), 0x0, 0x4000}], 0x0, &(0x7f0000000440)) [ 276.705750][T17445] loop1: detected capacity change from 0 to 64 [ 276.738188][T17445] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xe00}, 0x80) 05:15:01 executing program 3: symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') linkat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0xffffffffffffff9c, 0x0, 0x0) 05:15:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='ext4_allocate_blocks\x00', r1}, 0x10) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2e4, &(0x7f0000000b40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94\x9cr/-\xb5\xd2\xf4\xfb\xb3\xa4\xf7\xc2\xf5d\xb9juu'}, 0x30) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) [ 276.754871][T17452] loop5: detected capacity change from 0 to 64 [ 276.771669][T17458] loop4: detected capacity change from 0 to 64 [ 276.775980][T17445] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 276.786618][T17445] FAT-fs (loop1): Filesystem has been set read-only [ 276.804145][T17458] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 276.815634][T17452] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 276.819359][T17458] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 276.833594][T17458] FAT-fs (loop4): Filesystem has been set read-only [ 276.848639][T17452] FAT-fs (loop5): error, invalid access to FAT (entry 0x00fffff8) [ 276.856620][T17452] FAT-fs (loop5): Filesystem has been set read-only 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1002}, 0x80) 05:15:01 executing program 3: r0 = socket(0x2, 0x3, 0x0) fcntl$setown(r0, 0x6, 0x0) 05:15:01 executing program 2: openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:15:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fff", 0x5, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fff", 0x5, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:01 executing program 2: setsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000680), 0xc) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1100}, 0x80) [ 276.926522][T17471] loop4: detected capacity change from 0 to 64 [ 276.952673][T17481] loop1: detected capacity change from 0 to 64 [ 276.965774][T17471] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:01 executing program 3: open$dir(&(0x7f0000000d00)='./file0\x00', 0x0, 0x0) 05:15:01 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) accept$inet(r0, 0x0, 0x0) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1200}, 0x80) [ 276.975444][T17481] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 276.984508][T17476] loop5: detected capacity change from 0 to 64 [ 277.001021][T17481] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 277.007514][T17471] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 277.009863][T17481] FAT-fs (loop1): Filesystem has been set read-only 05:15:01 executing program 3: bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002400)=ANY=[@ANYBLOB="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"/1372], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x18000000000002e0, 0xe6c, 0xfffffffffffffe65, &(0x7f00000004c0)="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", 0x0, 0xfd, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4, &(0x7f0000001c40)="6ef2df064ac7a697d96cb6fdf628fc0092801337150d1639f9595fe98099f1a3ffe013f996ac85ebb86d55047f96d4cb3605de74f31c9b5cc980ffce521d66a33f0b90b2c95b5448a75ffdbc68891120fdb7aa57f0473c81a3ebc5ef09c00eebde0593edaa7561e33b2ebaa7b81bb961aec9ad24223c3646d37901d63dcbfd48d46773182311cda8acc55b47a8efe01e1c8d53a5d00b0283b0e6a997089596c607332debdbbd5f18ebb1e8a8442d3f0a5b1304c1688e1b416355406b020c92"}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) 05:15:01 executing program 2: socketpair(0x11, 0x0, 0x0, &(0x7f0000000040)) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1800}, 0x80) 05:15:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x102) 05:15:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fff", 0x5, 0x4000}], 0x0, &(0x7f0000000440)) [ 277.025203][T17471] FAT-fs (loop4): Filesystem has been set read-only [ 277.032677][T17476] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 277.045266][T17476] FAT-fs (loop5): error, invalid access to FAT (entry 0x00fffff8) [ 277.053417][T17476] FAT-fs (loop5): Filesystem has been set read-only 05:15:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:01 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x8, 0x1, &(0x7f00000000c0)=@raw=[@func], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:15:01 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fff", 0x5, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2000}, 0x80) [ 277.099038][T17501] loop4: detected capacity change from 0 to 64 [ 277.109248][T17501] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 277.119593][T17501] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 277.128193][T17501] FAT-fs (loop4): Filesystem has been set read-only 05:15:01 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2500}, 0x80) 05:15:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000003580)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000200)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="cb7fedb05dfb70bfd1e74e7aa09fc4cacae5a6353b21de1d977205f882fbb877e8e29e8b2a", 0x25}], 0x1, &(0x7f0000000140)=[@txtime={{0xe}}, @mark={{0x14}}, @timestamping={{0x14}}, @mark={{0x14}}, @mark={{0x14}}, @timestamping={{0x14}}, @timestamping={{0x14}}], 0xa8}, 0x0) 05:15:01 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fff", 0x5, 0x4000}], 0x0, &(0x7f0000000440)) [ 277.152784][T17508] loop1: detected capacity change from 0 to 64 05:15:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4000}, 0x80) 05:15:02 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000028c0)={&(0x7f0000001640)=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x10, 0x0}, 0x0) [ 277.196329][T17510] FAT-fs (loop5): bogus number of reserved sectors [ 277.196525][T17508] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 277.203133][T17510] FAT-fs (loop5): Can't find a valid FAT filesystem [ 277.218091][T17508] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 277.227363][T17508] FAT-fs (loop1): Filesystem has been set read-only [ 277.236253][T17516] loop4: detected capacity change from 0 to 64 05:15:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4800}, 0x80) [ 277.250283][ T24] audit: type=1400 audit(1643778902.061:286): avc: denied { write } for pid=17517 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 277.258512][T17516] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 277.307667][T17516] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 277.316220][T17516] FAT-fs (loop4): Filesystem has been set read-only 05:15:02 executing program 2: socketpair(0xa, 0x2, 0x11, &(0x7f0000000080)) 05:15:02 executing program 3: socketpair(0xa, 0x0, 0x7fff, &(0x7f0000000000)) 05:15:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4c00}, 0x80) 05:15:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff", 0x7, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff", 0x7, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:02 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001440)=""/88, 0x58}], 0x1, &(0x7f0000001500)=""/175, 0xaf}, 0x0) sendmsg(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001ac0)="0ef4ed8e222e52b86db23c7791e96d8de2e825a5c2553276455523e93255773c8c54b64a99fb89c6f3b5d333bb9f4e6d1c2d3d27bff1afb7a990a5ca65dc45ec34869274d47bbd08b8bbb2adc0317a5725e1580f61b1f7cf2b", 0x59}], 0x1}, 0x0) 05:15:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6800}, 0x80) [ 277.954235][T17533] loop1: detected capacity change from 0 to 64 [ 277.954550][T17534] loop4: detected capacity change from 0 to 64 [ 277.977270][T17531] FAT-fs (loop5): bogus number of reserved sectors [ 277.984808][T17531] FAT-fs (loop5): Can't find a valid FAT filesystem 05:15:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6c00}, 0x80) 05:15:02 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000013c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000001400)='cpuset.memory_pressure\x00', 0x0, 0x0) 05:15:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7400}, 0x80) [ 277.994445][ T24] audit: type=1400 audit(1643778902.801:287): avc: denied { read } for pid=17537 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 278.006694][T17534] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 278.029438][T17533] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 278.042698][T17533] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) 05:15:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7a00}, 0x80) 05:15:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) sendmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000027c0)=ANY=[], 0x1e8}, 0xc04c081) r0 = socket$kcm(0x29, 0x2, 0x0) close(r0) socket$kcm(0x2b, 0x1, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x6609, 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000140)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_ext={0x1c, 0x1, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1}, 0x78) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0xa, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x10, 0x1}, {}, {0x1, 0x4}]}]}, {0x0, [0x0, 0x30, 0x30, 0x0, 0x0, 0x2e, 0x30, 0x2e]}}, &(0x7f00000005c0)=""/245, 0x46, 0xf5, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0xa, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @ldst={0x0, 0x1, 0x0, 0x1, 0x7, 0xffffffffffffffc0, 0x4}, @jmp={0x5, 0x1, 0xa, 0x8, 0x5, 0xc, 0x8}, @cb_func={0x18, 0x9, 0x4, 0x0, 0x1}, @generic={0x3, 0x3, 0x6, 0x7, 0x3}, @exit]}, &(0x7f00000007c0)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000900), 0x8, 0x10, &(0x7f0000000940)={0x2, 0x8, 0x1, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000100), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001480)='cgroup.stat\x00', 0x7a05, 0x1700) setsockopt$sock_attach_bpf(r0, 0x1, 0xd, &(0x7f0000000080), 0x2cb) 05:15:02 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007000000850000000f00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r1}, 0x10) perf_event_open(&(0x7f00000013c0)={0x2, 0x80, 0xff, 0x0, 0x0, 0x1d, 0x0, 0x3, 0x4001, 0xb, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_config_ext, 0x820, 0x200, 0x6, 0x8, 0x0, 0x40401, 0x80, 0x0, 0x26dbd, 0x0, 0x100000001}, 0xffffffffffffffff, 0xc, r2, 0x3) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001340)=@bpf_tracing={0x1a, 0x9, &(0x7f0000001540)=ANY=[@ANYRES32, @ANYRES32=r0, @ANYBLOB="000ea5c63d30da419de08eca1b3a2ce2e332d4b9600c3f00"/67], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000002c0)=""/4096, 0x41100, 0xd09863cc24aa0c32, '\x00', 0x0, 0x1c, r0, 0x8, &(0x7f00000012c0)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000001300)={0x5, 0x8, 0x0, 0x6}, 0x10, 0x12e63, r0}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5923, 0x4}, 0x0, 0x0, 0x401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001500)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000014c0)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) mkdirat$cgroup(r5, &(0x7f0000000280)='syz1\x00', 0x1ff) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x1f, 0x80, 0x4, 0x9, 0x0, 0xffffffff, 0x1000, 0xe, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000040), 0x1}, 0x0, 0x0, 0x7, 0x9, 0x5, 0xffff0001, 0x2, 0x0, 0x20000, 0x0, 0x5a}, 0xffffffffffffffff, 0x2, r6, 0x1) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000015c0)=0xffffffffffffff1a, 0x12) [ 278.051368][T17533] FAT-fs (loop1): Filesystem has been set read-only [ 278.053545][T17534] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 278.066545][T17534] FAT-fs (loop4): Filesystem has been set read-only 05:15:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb000}, 0x80) [ 278.109512][ T24] audit: type=1400 audit(1643778902.921:288): avc: denied { setopt } for pid=17551 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 05:15:02 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff", 0x7, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:02 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6, 0x0, 0x0, 0x2}, 0x48) 05:15:02 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff", 0x7, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:02 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xc602}, 0x80) [ 278.162295][T17555] FAT-fs (loop5): bogus number of reserved sectors [ 278.169179][T17555] FAT-fs (loop5): Can't find a valid FAT filesystem [ 278.199764][T17564] loop1: detected capacity change from 0 to 64 05:15:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@struct={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000240)=""/213, 0x2b, 0xd5, 0x1}, 0x20) 05:15:03 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000280)={&(0x7f0000000080)=@tipc, 0x80, 0x0}, 0x0) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xed00}, 0x80) 05:15:03 executing program 2: socketpair(0xa, 0x3, 0xb8, &(0x7f0000000080)) [ 278.208695][T17568] loop4: detected capacity change from 0 to 64 [ 278.221286][T17564] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 278.250140][T17564] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) 05:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@var={0x3, 0x0, 0x0, 0xe, 0x5}, @union]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f00000003c0)=""/4096, 0x39, 0x1000, 0x1}, 0x20) 05:15:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xff00}, 0x80) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1ed6cc}, 0x80) [ 278.258852][T17564] FAT-fs (loop1): Filesystem has been set read-only [ 278.276119][T17568] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff", 0x7, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0x6}, 0x48) [ 278.307045][T17581] loop5: detected capacity change from 0 to 64 [ 278.327230][T17568] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 278.335832][T17568] FAT-fs (loop4): Filesystem has been set read-only [ 278.345899][T17581] FAT-fs (loop5): bogus number of reserved sectors 05:15:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff", 0x7, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x200000}, 0x80) 05:15:03 executing program 2: perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xf, 0x3, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='module_request\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000580)={0x0, 0x0}, 0x8) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x0, 0x1}, 0x8, 0x10, 0x0, 0x0, r2, r3}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.bfq.io_service_time\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x1000, &(0x7f00000013c0)=""/4096, 0x40f00, 0x4, '\x00', 0x0, 0x22, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000140)={0x0, 0x9, 0x400, 0x9c}, 0x10, r2, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[r4, 0xffffffffffffffff]}, 0x80) socket$kcm(0x29, 0x7, 0x0) sendmsg$inet(r0, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="0207000902000000e4a17c0200000000", 0x10}], 0x1}, 0x0) 05:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@struct={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000240)=""/213, 0x2b, 0xd5, 0x1}, 0x20) 05:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x8, [@struct={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000240)=""/213, 0x2c, 0xd5, 0x1}, 0x20) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1000000}, 0x80) 05:15:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 278.353053][T17581] FAT-fs (loop5): Can't find a valid FAT filesystem [ 278.357804][T17589] loop1: detected capacity change from 0 to 64 [ 278.368418][T17589] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 278.378215][T17589] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 278.386884][T17589] FAT-fs (loop1): Filesystem has been set read-only 05:15:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0f", 0x8, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2000000}, 0x80) 05:15:03 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f0000000280)=@name, 0x10, 0x0}, 0x0) [ 278.451615][T17600] loop4: detected capacity change from 0 to 64 [ 278.464251][T17607] loop1: detected capacity change from 0 to 64 [ 278.472027][T17601] loop5: detected capacity change from 0 to 64 [ 278.484792][T17600] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3000000}, 0x80) [ 278.511902][T17607] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 278.514680][T17600] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 278.529696][T17600] FAT-fs (loop4): Filesystem has been set read-only [ 278.538663][T17601] FAT-fs (loop5): bogus number of reserved sectors [ 278.545334][T17601] FAT-fs (loop5): Can't find a valid FAT filesystem [ 278.546919][T17607] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) 05:15:03 executing program 3: socketpair(0xa, 0x801, 0x0, &(0x7f0000000080)) [ 278.560572][T17607] FAT-fs (loop1): Filesystem has been set read-only 05:15:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0f", 0x8, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4000000}, 0x80) [ 278.637377][T17634] loop4: detected capacity change from 0 to 64 [ 278.650007][T17634] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 278.665079][T17634] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 278.673783][T17634] FAT-fs (loop4): Filesystem has been set read-only 05:15:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000440), 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000000)=""/214) 05:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x8}, {0x3, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/169, 0x3d, 0xa9, 0x1}, 0x20) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x5000000}, 0x80) 05:15:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0f", 0x8, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:03 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0f", 0x8, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:03 executing program 3: syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x2de041) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6000000}, 0x80) [ 279.018937][T17710] loop4: detected capacity change from 0 to 64 [ 279.025162][T17709] loop1: detected capacity change from 0 to 64 [ 279.029082][T17707] loop5: detected capacity change from 0 to 64 [ 279.046995][T17710] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:03 executing program 2: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x7, 0x3f, 0x5, 0x1f, 0x0, 0x1, 0x43050, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x4, @perf_config_ext={0xd7, 0xffffffffffffffff}, 0x0, 0x4000, 0x0, 0x0, 0xdb6, 0x8, 0x6, 0x0, 0x6, 0x0, 0x3}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7000000}, 0x80) 05:15:03 executing program 3: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)="a7", 0x1}], 0x1, &(0x7f0000003540)=ANY=[], 0x1010}, 0x4008014) sendmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f00000000c0)='/', 0x1}], 0x1}, 0x0) [ 279.062050][T17709] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 279.081315][T17709] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 279.086093][T17710] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 279.089949][T17709] FAT-fs (loop1): Filesystem has been set read-only [ 279.105092][T17710] FAT-fs (loop4): Filesystem has been set read-only 05:15:03 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f00000015c0)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001440)=""/88, 0x58}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000001a80)={0x0, 0x0, 0x0}, 0x0) 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8000000}, 0x80) [ 279.111244][ T24] audit: type=1400 audit(1643778903.911:289): avc: denied { write } for pid=17721 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 279.111982][T17707] FAT-fs (loop5): bogus number of reserved sectors [ 279.138383][T17707] FAT-fs (loop5): Can't find a valid FAT filesystem 05:15:03 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x9000000}, 0x80) 05:15:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0f", 0x8, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xa000000}, 0x80) [ 279.162325][ T24] audit: type=1400 audit(1643778903.971:290): avc: denied { cpu } for pid=17718 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 279.183909][ T24] audit: type=1400 audit(1643778903.981:291): avc: denied { ioctl } for pid=17718 comm="syz-executor.2" path="socket:[52773]" dev="sockfs" ino=52773 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 05:15:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0f", 0x8, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000940)={&(0x7f0000000800)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7}, {0x8}, {0x3, 0x2}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000880)=""/169, 0x45, 0xa9, 0x1}, 0x20) 05:15:04 executing program 2: syz_open_dev$evdev(&(0x7f00000001c0), 0x5, 0x0) 05:15:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb000000}, 0x80) [ 279.260686][T17737] loop1: detected capacity change from 0 to 64 [ 279.271706][T17741] loop4: detected capacity change from 0 to 64 [ 279.279173][T17743] loop5: detected capacity change from 0 to 64 [ 279.289175][T17737] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000012c0), 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80084502, &(0x7f0000002480)=""/26) 05:15:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xc000000}, 0x80) [ 279.305089][T17741] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 279.314896][T17743] FAT-fs (loop5): bogus number of reserved sectors [ 279.326670][T17743] FAT-fs (loop5): Can't find a valid FAT filesystem [ 279.330262][T17741] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 279.338054][T17737] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 279.342337][T17741] FAT-fs (loop4): Filesystem has been set read-only [ 279.350860][T17737] FAT-fs (loop1): Filesystem has been set read-only 05:15:04 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000012c0), 0x6ea2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000002440)={0x1f, 0x0, 0x33d, 0x0, "6f190414660a310319fa7fdaa2e0e338576ea7c5c87eb8cb9082f9650e8ca41b"}) 05:15:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000012c0), 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000025c0)) 05:15:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xd000000}, 0x80) 05:15:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9}], 0x0, &(0x7f0000000440)) 05:15:04 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000440), 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000140)=""/231) 05:15:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xe000000}, 0x80) [ 280.010361][T17760] FAT-fs (loop4): bogus number of reserved sectors [ 280.016939][T17760] FAT-fs (loop4): Can't find a valid FAT filesystem [ 280.025168][T17761] FAT-fs (loop1): bogus number of reserved sectors [ 280.031837][T17761] FAT-fs (loop1): Can't find a valid FAT filesystem [ 280.040612][T17758] loop5: detected capacity change from 0 to 64 05:15:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000012c0), 0x6ea2, 0x0) ioctl$EVIOCGREP(r0, 0x40084503, &(0x7f0000002480)=""/26) 05:15:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x10000000}, 0x80) 05:15:04 executing program 2: socketpair(0x7, 0x0, 0xff, 0x0) 05:15:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x10020000}, 0x80) 05:15:04 executing program 3: fcntl$dupfd(0xffffffffffffffff, 0xc, 0xffffffffffffffff) [ 280.055842][ T24] audit: type=1400 audit(1643778904.861:292): avc: denied { read } for pid=17768 comm="syz-executor.3" name="event2" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 280.092274][T17758] FAT-fs (loop5): bogus number of reserved sectors [ 280.099178][T17758] FAT-fs (loop5): Can't find a valid FAT filesystem 05:15:04 executing program 2: socketpair(0x0, 0x0, 0xff, 0x0) 05:15:04 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x11000000}, 0x80) 05:15:04 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9}], 0x0, &(0x7f0000000440)) [ 280.108925][ T24] audit: type=1400 audit(1643778904.891:293): avc: denied { open } for pid=17768 comm="syz-executor.3" path="/dev/input/event2" dev="devtmpfs" ino=220 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 280.133634][ T24] audit: type=1400 audit(1643778904.891:294): avc: denied { ioctl } for pid=17768 comm="syz-executor.3" path="/dev/input/event2" dev="devtmpfs" ino=220 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 05:15:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:05 executing program 2: pipe2(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x12000000}, 0x80) 05:15:05 executing program 3: socket$inet(0x2, 0x0, 0x1d) 05:15:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9}], 0x0, &(0x7f0000000440)) [ 280.190733][T17787] FAT-fs (loop4): bogus number of reserved sectors [ 280.197588][T17787] FAT-fs (loop4): Can't find a valid FAT filesystem 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x18000000}, 0x80) 05:15:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x20000000}, 0x80) [ 280.252120][T17797] loop5: detected capacity change from 0 to 64 [ 280.267300][T17798] FAT-fs (loop1): bogus number of reserved sectors [ 280.273826][T17798] FAT-fs (loop1): Can't find a valid FAT filesystem [ 280.276313][T17802] FAT-fs (loop4): bogus number of reserved sectors [ 280.287308][T17802] FAT-fs (loop4): Can't find a valid FAT filesystem 05:15:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:15:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x25000000}, 0x80) [ 280.303935][T17797] FAT-fs (loop5): bogus number of reserved sectors [ 280.310789][T17797] FAT-fs (loop5): Can't find a valid FAT filesystem [ 280.331990][T17809] loop3: detected capacity change from 0 to 64 05:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x40000000}, 0x80) [ 280.350397][T17809] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 280.407324][T17817] FAT-fs (loop1): bogus number of reserved sectors [ 280.409496][T17820] loop4: detected capacity change from 0 to 64 [ 280.413988][T17817] FAT-fs (loop1): Can't find a valid FAT filesystem [ 280.428954][T17822] loop5: detected capacity change from 0 to 64 [ 280.438453][T17809] FAT-fs (loop3): Directory bread(block 1986) failed [ 280.444028][T17820] FAT-fs (loop4): bogus number of reserved sectors 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x48000000}, 0x80) 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x4c000000}, 0x80) [ 280.446813][T17821] __nla_validate_parse: 2 callbacks suppressed [ 280.446836][T17821] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 280.451800][T17820] FAT-fs (loop4): Can't find a valid FAT filesystem [ 280.477405][T17809] FAT-fs (loop3): Directory bread(block 1987) failed [ 280.482925][T17822] FAT-fs (loop5): bogus number of reserved sectors [ 280.484789][T17809] FAT-fs (loop3): Directory bread(block 1988) failed [ 280.491299][T17822] FAT-fs (loop5): Can't find a valid FAT filesystem 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x68000000}, 0x80) 05:15:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) [ 280.505590][T17809] FAT-fs (loop3): Directory bread(block 1989) failed [ 280.512555][T17809] FAT-fs (loop3): Directory bread(block 1990) failed [ 280.520150][T17809] FAT-fs (loop3): Directory bread(block 1991) failed [ 280.528405][ T8029] blk_print_req_error: 39 callbacks suppressed [ 280.528421][ T8029] I/O error, dev loop4, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 280.542120][T17809] FAT-fs (loop3): Directory bread(block 1992) failed [ 280.543974][ T8029] buffer_io_error: 5 callbacks suppressed 05:15:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 280.543986][ T8029] Buffer I/O error on dev loop4, logical block 1, async page read [ 280.591988][T17824] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 280.594493][ T8029] I/O error, dev loop4, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 280.604933][T17838] loop4: detected capacity change from 0 to 64 [ 280.610453][ T8029] Buffer I/O error on dev loop4, logical block 2, async page read [ 280.624562][T17809] FAT-fs (loop3): Directory bread(block 1993) failed [ 280.632604][T17809] FAT-fs (loop3): Directory bread(block 1994) failed [ 280.632975][T17838] FAT-fs (loop4): bogus number of reserved sectors [ 280.639798][T17809] FAT-fs (loop3): Directory bread(block 1995) failed 05:15:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6c000000}, 0x80) 05:15:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 280.645995][T17838] FAT-fs (loop4): Can't find a valid FAT filesystem 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x74000000}, 0x80) [ 280.694967][T17844] loop1: detected capacity change from 0 to 64 [ 280.704600][T17843] loop5: detected capacity change from 0 to 64 [ 280.705957][ T6282] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 280.732301][T17852] loop4: detected capacity change from 0 to 64 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x7a000000}, 0x80) 05:15:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@private1}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) [ 280.741193][T17844] FAT-fs (loop1): bogus number of reserved sectors [ 280.747766][T17844] FAT-fs (loop1): Can't find a valid FAT filesystem [ 280.756364][T17843] FAT-fs (loop5): bogus number of reserved sectors [ 280.756689][ T6282] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 280.763278][T17843] FAT-fs (loop5): Can't find a valid FAT filesystem [ 280.772167][ T6282] Buffer I/O error on dev loop4, logical block 0, async page read 05:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x85ffffff}, 0x80) [ 280.791288][T17852] FAT-fs (loop4): bogus number of reserved sectors [ 280.797930][T17852] FAT-fs (loop4): Can't find a valid FAT filesystem [ 280.800034][T17853] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 280.814487][ T6611] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 280.830715][ T8029] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 05:15:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) r1 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB="010000000000000e3eda000800", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffff00000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0xac, 0xa, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_DATA={0x6c, 0x7, 0x0, 0x1, [@IPSET_ATTR_MARK={0x8}, @IPSET_ATTR_IFACE={0x14, 0x17, 'wg2\x00'}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_CADT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x21}, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x200}, @IPSET_ATTR_NAME={0x9, 0x12, 'syz0\x00'}, @IPSET_ATTR_ETHER={0xa, 0x11, @broadcast}, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_IFACE={0x14, 0x17, 'team_slave_1\x00'}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x10000}]}, 0xac}, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 280.868866][ T6282] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 280.898847][T17868] loop1: detected capacity change from 0 to 64 [ 280.906275][T17867] loop3: detected capacity change from 0 to 64 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xb0000000}, 0x80) [ 280.919725][T17868] FAT-fs (loop1): bogus number of reserved sectors [ 280.926496][T17868] FAT-fs (loop1): Can't find a valid FAT filesystem [ 280.934653][T17870] loop4: detected capacity change from 0 to 64 [ 280.940726][T17873] loop5: detected capacity change from 0 to 64 [ 280.949121][T17867] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 280.963552][T17870] FAT-fs (loop4): bogus number of reserved sectors 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xc6020000}, 0x80) [ 280.970436][T17870] FAT-fs (loop4): Can't find a valid FAT filesystem [ 280.983995][T17873] FAT-fs (loop5): bogus number of reserved sectors [ 280.990875][T17873] FAT-fs (loop5): Can't find a valid FAT filesystem [ 281.000396][T17876] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 281.005948][T17867] FAT-fs (loop3): Directory bread(block 1986) failed 05:15:05 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:05 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:05 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f800", 0x17}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 281.021891][T17867] FAT-fs (loop3): Directory bread(block 1987) failed [ 281.036684][T17867] FAT-fs (loop3): Directory bread(block 1988) failed 05:15:05 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xccd61e00}, 0x80) [ 281.069387][T17885] loop1: detected capacity change from 0 to 64 [ 281.076711][T17887] loop4: detected capacity change from 0 to 64 [ 281.083807][T17867] FAT-fs (loop3): Directory bread(block 1989) failed [ 281.088978][T17889] loop5: detected capacity change from 0 to 64 [ 281.100224][T17885] FAT-fs (loop1): bogus number of reserved sectors [ 281.106759][T17885] FAT-fs (loop1): Can't find a valid FAT filesystem 05:15:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 281.111517][T17867] FAT-fs (loop3): Directory bread(block 1990) failed [ 281.124857][T17889] FAT-fs (loop5): bogus number of FAT sectors [ 281.131650][T17889] FAT-fs (loop5): Can't find a valid FAT filesystem [ 281.139837][T17887] FAT-fs (loop4): bogus number of reserved sectors [ 281.146501][T17887] FAT-fs (loop4): Can't find a valid FAT filesystem [ 281.148752][T17867] FAT-fs (loop3): Directory bread(block 1991) failed [ 281.160338][T17867] FAT-fs (loop3): Directory bread(block 1992) failed [ 281.167383][T17867] FAT-fs (loop3): Directory bread(block 1993) failed [ 281.174273][T17867] FAT-fs (loop3): Directory bread(block 1994) failed [ 281.185822][T17867] FAT-fs (loop3): Directory bread(block 1995) failed 05:15:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 1) 05:15:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f800", 0x17}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xed000000}, 0x80) 05:15:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xff000000}, 0x80) [ 281.240410][T17901] loop1: detected capacity change from 0 to 64 [ 281.246024][T17902] loop4: detected capacity change from 0 to 64 [ 281.260690][T17903] loop5: detected capacity change from 0 to 64 [ 281.268629][T17901] FAT-fs (loop1): bogus number of reserved sectors [ 281.275158][T17901] FAT-fs (loop1): Can't find a valid FAT filesystem [ 281.280515][T17902] FAT-fs (loop4): bogus number of reserved sectors [ 281.284852][T17907] FAULT_INJECTION: forcing a failure. [ 281.284852][T17907] name failslab, interval 1, probability 0, space 0, times 1 [ 281.288439][T17902] FAT-fs (loop4): Can't find a valid FAT filesystem [ 281.301175][T17907] CPU: 0 PID: 17907 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 281.318336][T17907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.328473][T17907] Call Trace: [ 281.331756][T17907] [ 281.334872][T17907] dump_stack_lvl+0xd6/0x122 [ 281.339548][T17907] dump_stack+0x11/0x1b [ 281.343788][T17907] should_fail+0x23c/0x250 [ 281.348251][T17907] ? __se_sys_memfd_create+0xe9/0x350 [ 281.353697][T17907] __should_failslab+0x81/0x90 [ 281.358468][T17907] should_failslab+0x5/0x20 [ 281.363072][T17907] __kmalloc+0x6f/0x370 [ 281.367325][T17907] ? strnlen_user+0x137/0x1c0 [ 281.372066][T17907] __se_sys_memfd_create+0xe9/0x350 [ 281.377272][T17907] __x64_sys_memfd_create+0x2d/0x40 [ 281.382475][T17907] do_syscall_64+0x44/0xd0 [ 281.387054][T17907] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 281.393007][T17907] RIP: 0033:0x7fd2e4e7a059 [ 281.397424][T17907] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 281.417124][T17907] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 281.425664][T17907] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e4e7a059 05:15:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff85}, 0x80) 05:15:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 281.433638][T17907] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007fd2e4ed31e0 [ 281.441768][T17907] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007fd2e3ff01d0 [ 281.449739][T17907] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 281.457921][T17907] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 281.465994][T17907] [ 281.472287][T17903] FAT-fs (loop5): bogus number of FAT sectors [ 281.479458][T17903] FAT-fs (loop5): Can't find a valid FAT filesystem 05:15:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 2) [ 281.492245][ T6261] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 281.515796][T17916] FAULT_INJECTION: forcing a failure. [ 281.515796][T17916] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 281.529027][T17916] CPU: 0 PID: 17916 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 05:15:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:15:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 281.539758][T17916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.549884][T17916] Call Trace: [ 281.553206][T17916] [ 281.556152][T17916] dump_stack_lvl+0xd6/0x122 [ 281.560756][T17916] dump_stack+0x11/0x1b [ 281.564990][T17916] should_fail+0x23c/0x250 [ 281.569419][T17916] should_fail_usercopy+0x16/0x20 [ 281.574538][T17916] _copy_from_user+0x1c/0xd0 [ 281.579215][T17916] __se_sys_memfd_create+0x125/0x350 [ 281.584541][T17916] __x64_sys_memfd_create+0x2d/0x40 05:15:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 281.589968][T17916] do_syscall_64+0x44/0xd0 [ 281.594639][T17916] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 281.600536][T17916] RIP: 0033:0x7fd2e4e7a059 [ 281.605027][T17916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 281.613902][T17922] loop4: detected capacity change from 0 to 64 [ 281.624638][T17916] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 281.624660][T17916] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e4e7a059 [ 281.624674][T17916] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007fd2e4ed31e0 [ 281.639933][T17922] FAT-fs (loop4): bogus number of reserved sectors [ 281.647433][T17916] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007fd2e3ff01d0 [ 281.647450][T17916] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 281.647464][T17916] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 281.647480][T17916] 05:15:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f800", 0x17}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 05:15:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 3) [ 281.689048][T17922] FAT-fs (loop4): Can't find a valid FAT filesystem [ 281.720910][T17932] FAULT_INJECTION: forcing a failure. [ 281.720910][T17932] name failslab, interval 1, probability 0, space 0, times 0 [ 281.728354][T17928] loop5: detected capacity change from 0 to 64 [ 281.733751][T17932] CPU: 1 PID: 17932 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 281.750550][T17932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.760608][T17932] Call Trace: [ 281.763885][T17932] [ 281.766962][T17932] dump_stack_lvl+0xd6/0x122 [ 281.771571][T17932] dump_stack+0x11/0x1b [ 281.775792][T17932] should_fail+0x23c/0x250 [ 281.780208][T17932] ? shmem_alloc_inode+0x22/0x30 [ 281.785221][T17932] __should_failslab+0x81/0x90 [ 281.789994][T17932] ? shmem_match+0xa0/0xa0 [ 281.794486][T17932] should_failslab+0x5/0x20 [ 281.798994][T17932] kmem_cache_alloc+0x4f/0x320 [ 281.803797][T17932] ? shmem_match+0xa0/0xa0 [ 281.808322][T17932] shmem_alloc_inode+0x22/0x30 [ 281.813128][T17932] new_inode_pseudo+0x38/0x190 [ 281.817981][T17932] new_inode+0x21/0x100 [ 281.822201][T17932] shmem_get_inode+0xb7/0x490 [ 281.826882][T17932] __shmem_file_setup+0xf1/0x1d0 [ 281.832004][T17932] shmem_file_setup+0x37/0x40 [ 281.836748][T17932] __se_sys_memfd_create+0x1c1/0x350 [ 281.842213][T17932] __x64_sys_memfd_create+0x2d/0x40 [ 281.847486][T17932] do_syscall_64+0x44/0xd0 [ 281.851926][T17932] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 281.858136][T17932] RIP: 0033:0x7fd2e4e7a059 [ 281.862791][T17932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 281.882785][T17932] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 281.891247][T17932] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e4e7a059 [ 281.899758][T17932] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007fd2e4ed31e0 [ 281.907780][T17932] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007fd2e3ff01d0 05:15:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x3}, 0x80) [ 281.915897][T17932] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 281.923964][T17932] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 281.932213][T17932] [ 281.939026][T17928] FAT-fs (loop5): bogus number of FAT sectors [ 281.945306][T17928] FAT-fs (loop5): Can't find a valid FAT filesystem [ 281.948574][T17935] loop1: detected capacity change from 0 to 64 05:15:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4}, 0x80) 05:15:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x5}, 0x80) 05:15:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x18, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:06 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:06 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 4) [ 281.971202][T17935] FAT-fs (loop1): bogus number of reserved sectors [ 281.978054][T17935] FAT-fs (loop1): Can't find a valid FAT filesystem [ 282.023996][T17945] FAULT_INJECTION: forcing a failure. [ 282.023996][T17945] name failslab, interval 1, probability 0, space 0, times 0 [ 282.036829][T17945] CPU: 1 PID: 17945 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 282.047510][T17945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.057960][T17945] Call Trace: [ 282.061713][T17945] [ 282.064646][T17945] dump_stack_lvl+0xd6/0x122 [ 282.069350][T17945] dump_stack+0x11/0x1b [ 282.074395][T17945] should_fail+0x23c/0x250 [ 282.079361][T17945] ? security_inode_alloc+0x30/0x180 [ 282.085313][T17945] __should_failslab+0x81/0x90 [ 282.090293][T17945] should_failslab+0x5/0x20 [ 282.094244][T17952] loop5: detected capacity change from 0 to 64 [ 282.094807][T17945] kmem_cache_alloc+0x4f/0x320 [ 282.094852][T17945] security_inode_alloc+0x30/0x180 [ 282.110935][T17945] inode_init_always+0x214/0x3e0 [ 282.116233][T17945] ? shmem_match+0xa0/0xa0 [ 282.120980][T17945] new_inode_pseudo+0x6f/0x190 [ 282.125878][T17945] new_inode+0x21/0x100 [ 282.130061][T17945] shmem_get_inode+0xb7/0x490 [ 282.135571][T17945] __shmem_file_setup+0xf1/0x1d0 [ 282.141051][T17945] shmem_file_setup+0x37/0x40 [ 282.145759][T17945] __se_sys_memfd_create+0x1c1/0x350 [ 282.151048][T17945] __x64_sys_memfd_create+0x2d/0x40 [ 282.156410][T17945] do_syscall_64+0x44/0xd0 [ 282.160890][T17945] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 282.166888][T17945] RIP: 0033:0x7fd2e4e7a059 [ 282.171473][T17945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 282.192321][T17945] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 282.201281][T17945] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e4e7a059 [ 282.209462][T17945] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007fd2e4ed31e0 05:15:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:06 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6}, 0x80) 05:15:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x26, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x7}, 0x80) [ 282.217578][T17945] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007fd2e3ff01d0 [ 282.225805][T17945] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 282.234034][T17945] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 282.242446][T17945] [ 282.258956][T17952] FAT-fs (loop5): bogus number of FAT sectors [ 282.265358][T17952] FAT-fs (loop5): Can't find a valid FAT filesystem 05:15:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 5) 05:15:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x8}, 0x80) 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x73, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 282.268754][T17958] loop1: detected capacity change from 0 to 64 [ 282.276500][T17954] loop4: detected capacity change from 0 to 64 [ 282.286277][T17954] FAT-fs (loop4): bogus number of reserved sectors [ 282.293079][T17954] FAT-fs (loop4): Can't find a valid FAT filesystem 05:15:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 282.323968][T17958] FAT-fs (loop1): bogus number of reserved sectors [ 282.325844][T17966] FAULT_INJECTION: forcing a failure. [ 282.325844][T17966] name failslab, interval 1, probability 0, space 0, times 0 [ 282.330732][T17958] FAT-fs (loop1): Can't find a valid FAT filesystem [ 282.343694][T17966] CPU: 0 PID: 17966 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 282.361550][T17966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:15:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f800", 0x17}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f800", 0x17}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 282.371629][T17966] Call Trace: [ 282.374901][T17966] [ 282.377831][T17966] dump_stack_lvl+0xd6/0x122 [ 282.382524][T17966] dump_stack+0x11/0x1b [ 282.386687][T17966] should_fail+0x23c/0x250 [ 282.391483][T17966] ? __d_alloc+0x36/0x370 [ 282.395902][T17966] __should_failslab+0x81/0x90 [ 282.400854][T17966] should_failslab+0x5/0x20 [ 282.403226][T17972] loop5: detected capacity change from 0 to 64 [ 282.405526][T17966] kmem_cache_alloc+0x4f/0x320 [ 282.405578][T17966] ? __init_rwsem+0x59/0x70 05:15:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f800", 0x17}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 282.405600][T17966] __d_alloc+0x36/0x370 [ 282.405636][T17966] ? debug_smp_processor_id+0x18/0x20 [ 282.432949][T17966] d_alloc_pseudo+0x1a/0x50 [ 282.437623][T17966] alloc_file_pseudo+0x77/0x150 [ 282.443008][T17966] __shmem_file_setup+0x14c/0x1d0 [ 282.448180][T17966] shmem_file_setup+0x37/0x40 [ 282.453101][T17966] __se_sys_memfd_create+0x1c1/0x350 [ 282.458416][T17966] __x64_sys_memfd_create+0x2d/0x40 [ 282.464027][T17966] do_syscall_64+0x44/0xd0 [ 282.468538][T17966] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 282.474501][T17966] RIP: 0033:0x7fd2e4e7a059 [ 282.479091][T17966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 282.499054][T17966] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 282.507479][T17966] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e4e7a059 [ 282.515813][T17966] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007fd2e4ed31e0 05:15:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x9}, 0x80) [ 282.523811][T17966] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007fd2e3ff01d0 [ 282.532044][T17966] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 282.540496][T17966] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 282.548677][T17966] [ 282.560928][ T8029] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 05:15:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xa}, 0x80) [ 282.577803][ T6282] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 282.591109][T17972] FAT-fs (loop5): bogus number of FAT sectors [ 282.597709][T17972] FAT-fs (loop5): Can't find a valid FAT filesystem [ 282.617603][T17983] loop1: detected capacity change from 0 to 64 05:15:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 6) 05:15:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb}, 0x80) 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x83, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 282.622969][T17985] loop4: detected capacity change from 0 to 64 [ 282.628979][T17983] FAT-fs (loop1): bogus number of reserved sectors [ 282.636962][T17983] FAT-fs (loop1): Can't find a valid FAT filesystem [ 282.646318][T17985] FAT-fs (loop4): bogus number of FAT sectors [ 282.652455][T17985] FAT-fs (loop4): Can't find a valid FAT filesystem [ 282.668820][T17990] FAULT_INJECTION: forcing a failure. 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x204, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 282.668820][T17990] name failslab, interval 1, probability 0, space 0, times 0 [ 282.682147][T17990] CPU: 1 PID: 17990 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 282.692932][T17990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.703344][T17990] Call Trace: [ 282.706653][T17990] [ 282.709598][T17990] dump_stack_lvl+0xd6/0x122 [ 282.714996][T17990] dump_stack+0x11/0x1b [ 282.719821][T17990] should_fail+0x23c/0x250 05:15:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xc}, 0x80) 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 282.724544][T17990] ? __alloc_file+0x2e/0x1a0 [ 282.729274][T17990] __should_failslab+0x81/0x90 [ 282.734135][T17990] should_failslab+0x5/0x20 [ 282.739002][T17990] kmem_cache_alloc+0x4f/0x320 [ 282.743898][T17990] __alloc_file+0x2e/0x1a0 [ 282.748320][T17990] alloc_empty_file+0xcd/0x1c0 [ 282.753265][T17990] alloc_file+0x3a/0x280 [ 282.757553][T17990] alloc_file_pseudo+0xfa/0x150 [ 282.762679][T17990] __shmem_file_setup+0x14c/0x1d0 [ 282.768326][T17990] shmem_file_setup+0x37/0x40 [ 282.769373][T17999] loop5: detected capacity change from 0 to 64 [ 282.773091][T17990] __se_sys_memfd_create+0x1c1/0x350 [ 282.773125][T17990] __x64_sys_memfd_create+0x2d/0x40 [ 282.773184][T17990] do_syscall_64+0x44/0xd0 [ 282.794413][T17990] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 282.800505][T17990] RIP: 0033:0x7fd2e4e7a059 [ 282.805179][T17990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 282.826278][T17990] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 282.835027][T17990] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e4e7a059 [ 282.843055][T17990] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007fd2e4ed31e0 [ 282.851370][T17990] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007fd2e3ff01d0 [ 282.859338][T17990] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 282.867425][T17990] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 282.876092][T17990] 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x402, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xd}, 0x80) 05:15:07 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 282.882210][T17999] FAT-fs (loop5): bogus number of FAT sectors [ 282.888644][T17999] FAT-fs (loop5): Can't find a valid FAT filesystem 05:15:07 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 7) 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x406, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 282.930616][T18007] loop1: detected capacity change from 0 to 64 [ 282.946212][T18011] loop4: detected capacity change from 0 to 64 [ 282.952751][T18007] FAT-fs (loop1): bogus number of reserved sectors [ 282.959456][T18007] FAT-fs (loop1): Can't find a valid FAT filesystem [ 282.969860][T18014] FAULT_INJECTION: forcing a failure. 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xe}, 0x80) 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 282.969860][T18014] name failslab, interval 1, probability 0, space 0, times 0 [ 282.975863][T18011] FAT-fs (loop4): bogus number of FAT sectors [ 282.982953][T18014] CPU: 1 PID: 18014 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 282.989585][T18011] FAT-fs (loop4): Can't find a valid FAT filesystem [ 283.006982][T18014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.017039][T18014] Call Trace: [ 283.020316][T18014] [ 283.023245][T18014] dump_stack_lvl+0xd6/0x122 05:15:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x604, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 283.027980][T18014] dump_stack+0x11/0x1b [ 283.032280][T18014] should_fail+0x23c/0x250 [ 283.037041][T18014] ? security_file_alloc+0x30/0x190 [ 283.042366][T18014] __should_failslab+0x81/0x90 [ 283.047283][T18014] should_failslab+0x5/0x20 [ 283.051828][T18014] kmem_cache_alloc+0x4f/0x320 [ 283.056690][T18014] security_file_alloc+0x30/0x190 [ 283.061767][T18014] __alloc_file+0x83/0x1a0 [ 283.066288][T18014] alloc_empty_file+0xcd/0x1c0 [ 283.071069][T18014] alloc_file+0x3a/0x280 05:15:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:07 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x10}, 0x80) [ 283.075476][T18014] alloc_file_pseudo+0xfa/0x150 [ 283.086559][T18014] __shmem_file_setup+0x14c/0x1d0 [ 283.091961][T18014] shmem_file_setup+0x37/0x40 [ 283.096716][T18014] __se_sys_memfd_create+0x1c1/0x350 [ 283.102280][T18014] __x64_sys_memfd_create+0x2d/0x40 [ 283.108174][T18014] do_syscall_64+0x44/0xd0 [ 283.112844][T18014] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.115184][T18024] loop5: detected capacity change from 0 to 64 [ 283.118743][T18014] RIP: 0033:0x7fd2e4e7a059 [ 283.118762][T18014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 283.118837][T18014] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 283.118858][T18014] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007fd2e4e7a059 [ 283.118872][T18014] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007fd2e4ed31e0 [ 283.118886][T18014] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007fd2e3ff01d0 [ 283.185424][T18014] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 283.193646][T18014] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 283.202083][T18014] [ 283.208211][T18024] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f800", 0x17}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x11}, 0x80) 05:15:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 8) 05:15:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 283.248057][ T6282] Buffer I/O error on dev loop1, logical block 1, async page read [ 283.250322][ T8029] Buffer I/O error on dev loop4, logical block 1, async page read [ 283.255979][ T6282] Buffer I/O error on dev loop1, logical block 2, async page read [ 283.272191][ T8029] Buffer I/O error on dev loop4, logical block 2, async page read [ 283.278544][ T6282] Buffer I/O error on dev loop1, logical block 3, async page read [ 283.287781][ T8029] Buffer I/O error on dev loop4, logical block 3, async page read 05:15:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2600, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x12}, 0x80) [ 283.296313][ T6282] Buffer I/O error on dev loop1, logical block 4, async page read [ 283.314866][T18041] FAULT_INJECTION: forcing a failure. [ 283.314866][T18041] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 283.328383][T18041] CPU: 0 PID: 18041 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 05:15:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 283.339351][T18041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.349670][T18041] Call Trace: [ 283.352957][T18041] [ 283.356089][T18040] loop5: detected capacity change from 0 to 64 [ 283.356433][T18041] dump_stack_lvl+0xd6/0x122 [ 283.356466][T18041] dump_stack+0x11/0x1b [ 283.356517][T18041] should_fail+0x23c/0x250 [ 283.356542][T18041] __alloc_pages+0x102/0x330 [ 283.380484][T18041] alloc_pages_vma+0x67e/0x810 [ 283.383740][T18040] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x18}, 0x80) 05:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25}, 0x80) [ 283.385257][T18041] shmem_getpage_gfp+0x8b4/0x12c0 [ 283.385336][T18041] shmem_write_begin+0x7e/0x100 [ 283.404514][T18041] generic_perform_write+0x1c8/0x400 [ 283.409813][T18041] ? current_time+0xed/0x1a0 [ 283.414679][T18041] __generic_file_write_iter+0xf7/0x2b0 [ 283.420340][T18041] ? generic_write_checks+0x250/0x290 [ 283.425832][T18041] generic_file_write_iter+0x75/0x130 [ 283.431623][T18041] vfs_write+0x7f5/0x950 [ 283.435980][T18041] __x64_sys_pwrite64+0xf5/0x150 [ 283.441018][T18041] do_syscall_64+0x44/0xd0 [ 283.445444][T18041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.451348][T18041] RIP: 0033:0x7fd2e4e2d027 [ 283.455855][T18041] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 283.475699][T18041] RSP: 002b:00007fd2e3feff00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 283.484140][T18041] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e2d027 [ 283.492220][T18041] RDX: 000000000000002d RSI: 0000000020010000 RDI: 0000000000000004 [ 283.500171][T18041] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 283.508122][T18041] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 283.516144][T18041] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 283.524102][T18041] [ 283.528552][T18041] loop3: detected capacity change from 0 to 64 [ 283.537579][T18043] loop4: detected capacity change from 0 to 64 05:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x48}, 0x80) 05:15:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f800", 0x17}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 9) 05:15:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 283.540401][T18038] loop1: detected capacity change from 0 to 64 [ 283.550488][T18041] FAT-fs (loop3): bogus number of reserved sectors [ 283.555364][T18043] FAT-fs (loop4): bogus number of FAT sectors [ 283.557031][T18041] FAT-fs (loop3): Can't find a valid FAT filesystem [ 283.560145][T18038] FAT-fs (loop1): bogus number of FAT sectors [ 283.563162][T18043] FAT-fs (loop4): Can't find a valid FAT filesystem [ 283.569775][T18038] FAT-fs (loop1): Can't find a valid FAT filesystem [ 283.622113][T18059] loop5: detected capacity change from 0 to 64 [ 283.622285][T18065] FAULT_INJECTION: forcing a failure. [ 283.622285][T18065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.641476][T18065] CPU: 1 PID: 18065 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 283.651978][T18065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.662123][T18065] Call Trace: [ 283.665406][T18065] 05:15:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4c}, 0x80) 05:15:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 283.668333][T18065] dump_stack_lvl+0xd6/0x122 [ 283.672977][T18065] dump_stack+0x11/0x1b [ 283.677143][T18065] should_fail+0x23c/0x250 [ 283.681629][T18065] should_fail_usercopy+0x16/0x20 [ 283.686727][T18065] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 283.692545][T18065] ? shmem_write_begin+0x7e/0x100 [ 283.697625][T18065] generic_perform_write+0x211/0x400 [ 283.702912][T18065] ? current_time+0xed/0x1a0 [ 283.705365][T18059] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 283.707553][T18065] __generic_file_write_iter+0xf7/0x2b0 05:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x68}, 0x80) 05:15:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 283.707578][T18065] ? generic_write_checks+0x250/0x290 [ 283.707603][T18065] generic_file_write_iter+0x75/0x130 [ 283.707632][T18065] vfs_write+0x7f5/0x950 [ 283.707686][T18065] __x64_sys_pwrite64+0xf5/0x150 [ 283.707708][T18065] do_syscall_64+0x44/0xd0 [ 283.707732][T18065] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 283.752712][T18065] RIP: 0033:0x7fd2e4e2d027 05:15:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f800", 0x17}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8008, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 283.757128][T18065] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 283.776748][T18065] RSP: 002b:00007fd2e3feff00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 283.785165][T18065] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e2d027 [ 283.793174][T18065] RDX: 000000000000002d RSI: 0000000020010000 RDI: 0000000000000004 [ 283.801148][T18065] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 283.809301][T18065] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 05:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c}, 0x80) [ 283.817282][T18065] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 283.825356][T18065] [ 283.831883][T18081] loop4: detected capacity change from 0 to 64 [ 283.873173][T18081] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 283.888093][T18065] loop3: detected capacity change from 0 to 64 [ 283.901156][T18065] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 283.911992][T18065] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 283.919877][T18065] FAT-fs (loop3): Filesystem has been set read-only 05:15:08 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 10) 05:15:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:08 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x74}, 0x80) 05:15:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8300, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:08 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:08 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 283.994006][T18098] loop4: detected capacity change from 0 to 64 [ 283.997916][T18100] loop1: detected capacity change from 0 to 64 [ 284.004545][T18101] loop5: detected capacity change from 0 to 64 [ 284.017637][T18100] FAT-fs (loop1): bogus number of FAT sectors [ 284.023804][T18100] FAT-fs (loop1): Can't find a valid FAT filesystem [ 284.030768][T18098] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 284.034485][T18103] FAULT_INJECTION: forcing a failure. [ 284.034485][T18103] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 284.053164][T18103] CPU: 0 PID: 18103 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 284.063672][T18103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.073735][T18103] Call Trace: [ 284.077017][T18103] [ 284.079949][T18103] dump_stack_lvl+0xd6/0x122 [ 284.084555][T18103] dump_stack+0x11/0x1b [ 284.088718][T18103] should_fail+0x23c/0x250 [ 284.093233][T18103] __alloc_pages+0x102/0x330 [ 284.097853][T18103] alloc_pages_vma+0x67e/0x810 [ 284.102630][T18103] shmem_getpage_gfp+0x8b4/0x12c0 [ 284.107664][T18103] shmem_write_begin+0x7e/0x100 [ 284.112552][T18103] generic_perform_write+0x1c8/0x400 [ 284.117851][T18103] ? current_time+0xed/0x1a0 [ 284.122458][T18103] __generic_file_write_iter+0xf7/0x2b0 [ 284.128269][T18103] ? generic_write_checks+0x250/0x290 [ 284.133786][T18103] generic_file_write_iter+0x75/0x130 [ 284.139208][T18103] vfs_write+0x7f5/0x950 [ 284.143457][T18103] __x64_sys_pwrite64+0xf5/0x150 [ 284.148393][T18103] do_syscall_64+0x44/0xd0 [ 284.152823][T18103] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 284.158725][T18103] RIP: 0033:0x7fd2e4e2d027 [ 284.163144][T18103] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 284.183027][T18103] RSP: 002b:00007fd2e3feff00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 05:15:08 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 284.191510][T18103] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e2d027 [ 284.199489][T18103] RDX: 0000000000000009 RSI: 0000000020010500 RDI: 0000000000000004 [ 284.207462][T18103] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 284.215440][T18103] R10: 0000000000004000 R11: 0000000000000293 R12: 0000000000000004 [ 284.223676][T18103] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 284.231873][T18103] [ 284.237707][T18103] loop3: detected capacity change from 0 to 64 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x7a}, 0x80) 05:15:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000", 0x22}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb0}, 0x80) 05:15:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 284.239669][T18101] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 284.277396][T18103] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 11) 05:15:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xed}, 0x80) 05:15:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 284.319317][T18116] loop1: detected capacity change from 0 to 64 [ 284.326340][T18103] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 284.334923][T18103] FAT-fs (loop3): Filesystem has been set read-only [ 284.350352][T18116] FAT-fs (loop1): bogus number of FAT sectors [ 284.356708][T18116] FAT-fs (loop1): Can't find a valid FAT filesystem 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x210}, 0x80) [ 284.405197][T18122] loop4: detected capacity change from 0 to 64 [ 284.410404][T18123] loop5: detected capacity change from 0 to 64 [ 284.436614][T18128] FAULT_INJECTION: forcing a failure. [ 284.436614][T18128] name failslab, interval 1, probability 0, space 0, times 0 [ 284.449422][T18128] CPU: 1 PID: 18128 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 284.459984][T18128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.470039][T18128] Call Trace: [ 284.473339][T18128] [ 284.476264][T18128] dump_stack_lvl+0xd6/0x122 [ 284.480867][T18128] dump_stack+0x11/0x1b [ 284.485062][T18128] should_fail+0x23c/0x250 [ 284.489620][T18128] ? xas_create+0x3fb/0xb10 [ 284.494228][T18128] __should_failslab+0x81/0x90 [ 284.499016][T18128] should_failslab+0x5/0x20 [ 284.503558][T18128] kmem_cache_alloc+0x4f/0x320 [ 284.508523][T18128] xas_create+0x3fb/0xb10 [ 284.512859][T18128] xas_store+0x70/0xca0 [ 284.517014][T18128] ? xas_find_conflict+0x422/0x4c0 [ 284.522191][T18128] shmem_add_to_page_cache+0x441/0x590 [ 284.527667][T18128] shmem_getpage_gfp+0xae9/0x12c0 [ 284.532703][T18128] shmem_write_begin+0x7e/0x100 [ 284.537569][T18128] generic_perform_write+0x1c8/0x400 [ 284.542854][T18128] ? current_time+0xed/0x1a0 [ 284.547487][T18128] __generic_file_write_iter+0xf7/0x2b0 [ 284.553150][T18128] ? generic_write_checks+0x250/0x290 [ 284.558547][T18128] generic_file_write_iter+0x75/0x130 [ 284.563926][T18128] vfs_write+0x7f5/0x950 [ 284.568173][T18128] __x64_sys_pwrite64+0xf5/0x150 [ 284.573157][T18128] do_syscall_64+0x44/0xd0 [ 284.577586][T18128] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 284.583557][T18128] RIP: 0033:0x7fd2e4e2d027 [ 284.587976][T18128] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 284.607664][T18128] RSP: 002b:00007fd2e3feff00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 284.616098][T18128] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e2d027 [ 284.624074][T18128] RDX: 0000000000000009 RSI: 0000000020010500 RDI: 0000000000000004 [ 284.632045][T18128] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 284.640019][T18128] R10: 0000000000004000 R11: 0000000000000293 R12: 0000000000000004 [ 284.647997][T18128] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 05:15:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80040, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2c6}, 0x80) [ 284.656109][T18128] [ 284.664434][T18126] loop1: detected capacity change from 0 to 64 [ 284.679995][T18122] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 284.692045][T18123] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x300}, 0x80) [ 284.704639][T18126] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 284.746707][T18128] loop3: detected capacity change from 0 to 64 05:15:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 12) 05:15:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x500}, 0x80) [ 284.770759][T18128] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 284.780887][T18128] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 284.789665][T18128] FAT-fs (loop3): Filesystem has been set read-only [ 284.848474][T18150] loop1: detected capacity change from 0 to 64 [ 284.849317][T18149] loop4: detected capacity change from 0 to 64 [ 284.864803][T18154] FAULT_INJECTION: forcing a failure. [ 284.864803][T18154] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 284.878017][T18154] CPU: 0 PID: 18154 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 284.888647][T18154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.893108][T18148] loop5: detected capacity change from 0 to 64 [ 284.898704][T18154] Call Trace: [ 284.898736][T18154] [ 284.898742][T18154] dump_stack_lvl+0xd6/0x122 [ 284.898776][T18154] dump_stack+0x11/0x1b [ 284.898801][T18154] should_fail+0x23c/0x250 [ 284.914647][T18150] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 284.915731][T18154] should_fail_usercopy+0x16/0x20 [ 284.920051][T18149] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000", 0x28}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x600}, 0x80) [ 284.924387][T18154] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 284.924425][T18154] ? shmem_write_begin+0x7e/0x100 [ 284.951061][T18148] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 284.953295][T18154] generic_perform_write+0x211/0x400 [ 284.953323][T18154] ? current_time+0xed/0x1a0 [ 284.977462][T18154] __generic_file_write_iter+0xf7/0x2b0 [ 284.983020][T18154] ? generic_write_checks+0x250/0x290 [ 284.988476][T18154] generic_file_write_iter+0x75/0x130 [ 284.993975][T18154] vfs_write+0x7f5/0x950 05:15:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x700}, 0x80) 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x900}, 0x80) [ 284.998304][T18154] __x64_sys_pwrite64+0xf5/0x150 [ 285.003277][T18154] do_syscall_64+0x44/0xd0 [ 285.007818][T18154] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.013789][T18154] RIP: 0033:0x7fd2e4e2d027 [ 285.018273][T18154] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 285.037973][T18154] RSP: 002b:00007fd2e3feff00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 285.046746][T18154] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e2d027 [ 285.054701][T18154] RDX: 0000000000000009 RSI: 0000000020010500 RDI: 0000000000000004 [ 285.062849][T18154] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 285.070801][T18154] R10: 0000000000004000 R11: 0000000000000293 R12: 0000000000000004 [ 285.078754][T18154] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 285.086707][T18154] [ 285.091107][T18154] loop3: detected capacity change from 0 to 64 [ 285.101545][T18154] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 285.120101][T18154] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 285.128038][T18154] FAT-fs (loop3): Filesystem has been set read-only [ 285.142861][T18167] loop5: detected capacity change from 0 to 64 05:15:09 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 13) 05:15:09 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:09 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xa00}, 0x80) 05:15:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, 0x0) 05:15:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:09 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 285.155114][T18167] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 285.185783][T18170] loop1: detected capacity change from 0 to 64 05:15:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb00}, 0x80) 05:15:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xc00}, 0x80) [ 285.201736][T18175] loop4: detected capacity change from 0 to 64 [ 285.219055][T18181] FAULT_INJECTION: forcing a failure. [ 285.219055][T18181] name failslab, interval 1, probability 0, space 0, times 0 [ 285.226038][T18177] loop5: detected capacity change from 0 to 64 [ 285.231699][T18181] CPU: 0 PID: 18181 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 05:15:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, 0x0) 05:15:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, 0x0) 05:15:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xd00}, 0x80) [ 285.231728][T18181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.231740][T18181] Call Trace: [ 285.262410][T18181] [ 285.265343][T18181] dump_stack_lvl+0xd6/0x122 [ 285.269950][T18181] dump_stack+0x11/0x1b [ 285.274208][T18181] should_fail+0x23c/0x250 [ 285.278629][T18181] ? getname_flags+0x84/0x3f0 [ 285.283313][T18181] __should_failslab+0x81/0x90 [ 285.288139][T18181] should_failslab+0x5/0x20 [ 285.292702][T18181] kmem_cache_alloc+0x4f/0x320 [ 285.297504][T18181] getname_flags+0x84/0x3f0 05:15:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x73, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 285.302062][T18181] ? vfs_write+0x667/0x950 [ 285.306661][T18181] getname+0x15/0x20 [ 285.310568][T18181] do_sys_openat2+0x6d/0x2b0 [ 285.315166][T18181] __x64_sys_openat+0xef/0x110 [ 285.319947][T18181] do_syscall_64+0x44/0xd0 [ 285.324454][T18181] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.330395][T18181] RIP: 0033:0x7fd2e4e2cf74 [ 285.334821][T18181] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 285.354440][T18181] RSP: 002b:00007fd2e3fefeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 285.362847][T18181] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e2cf74 [ 285.370866][T18181] RDX: 0000000000000002 RSI: 00007fd2e3feffe0 RDI: 00000000ffffff9c [ 285.378913][T18181] RBP: 00007fd2e3feffe0 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 285.386924][T18181] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 285.394903][T18181] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 285.402874][T18181] 05:15:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 14) 05:15:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xe00}, 0x80) 05:15:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 1) 05:15:10 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 285.413622][T18170] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 285.450818][T18196] FAULT_INJECTION: forcing a failure. [ 285.450818][T18196] name failslab, interval 1, probability 0, space 0, times 0 [ 285.463529][T18196] CPU: 0 PID: 18196 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 285.468641][T18199] FAULT_INJECTION: forcing a failure. [ 285.468641][T18199] name failslab, interval 1, probability 0, space 0, times 0 [ 285.474110][T18196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.496973][T18196] Call Trace: [ 285.500245][T18196] [ 285.503163][T18196] dump_stack_lvl+0xd6/0x122 [ 285.507795][T18196] dump_stack+0x11/0x1b [ 285.511952][T18196] should_fail+0x23c/0x250 [ 285.516360][T18196] ? __se_sys_memfd_create+0xe9/0x350 [ 285.521728][T18196] __should_failslab+0x81/0x90 [ 285.526525][T18196] should_failslab+0x5/0x20 [ 285.531043][T18196] __kmalloc+0x6f/0x370 [ 285.535228][T18196] ? strnlen_user+0x137/0x1c0 [ 285.539918][T18196] __se_sys_memfd_create+0xe9/0x350 [ 285.545389][T18196] __x64_sys_memfd_create+0x2d/0x40 [ 285.550592][T18196] do_syscall_64+0x44/0xd0 [ 285.555015][T18196] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.561144][T18196] RIP: 0033:0x7f89d6e82059 [ 285.565658][T18196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 285.585272][T18196] RSP: 002b:00007f89d5ff7f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 285.593686][T18196] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f89d6e82059 [ 285.601810][T18196] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007f89d6edb1e0 [ 285.609905][T18196] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007f89d5ff81d0 [ 285.617948][T18196] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 285.625911][T18196] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 285.633875][T18196] [ 285.636963][T18199] CPU: 1 PID: 18199 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 285.647541][T18199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.657609][T18199] Call Trace: [ 285.660875][T18199] [ 285.663798][T18199] dump_stack_lvl+0xd6/0x122 [ 285.668483][T18199] dump_stack+0x11/0x1b [ 285.672693][T18199] should_fail+0x23c/0x250 [ 285.677109][T18199] ? getname_flags+0x84/0x3f0 [ 285.681802][T18199] __should_failslab+0x81/0x90 [ 285.686595][T18199] should_failslab+0x5/0x20 [ 285.691120][T18199] kmem_cache_alloc+0x4f/0x320 [ 285.695994][T18199] getname_flags+0x84/0x3f0 [ 285.700492][T18199] ? vfs_write+0x667/0x950 [ 285.704899][T18199] getname+0x15/0x20 [ 285.708856][T18199] do_sys_openat2+0x6d/0x2b0 [ 285.713435][T18199] __x64_sys_openat+0xef/0x110 [ 285.718276][T18199] do_syscall_64+0x44/0xd0 [ 285.722741][T18199] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.728728][T18199] RIP: 0033:0x7fd2e4e2cf74 [ 285.733360][T18199] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 285.753090][T18199] RSP: 002b:00007fd2e3fefeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 05:15:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 15) 05:15:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 2) [ 285.761499][T18199] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e2cf74 [ 285.769459][T18199] RDX: 0000000000000002 RSI: 00007fd2e3feffe0 RDI: 00000000ffffff9c [ 285.777555][T18199] RBP: 00007fd2e3feffe0 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 285.785518][T18199] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 285.793488][T18199] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 285.801452][T18199] [ 285.842537][T18205] FAULT_INJECTION: forcing a failure. [ 285.842537][T18205] name failslab, interval 1, probability 0, space 0, times 0 [ 285.855196][T18205] CPU: 1 PID: 18205 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 285.865712][T18205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.875811][T18205] Call Trace: [ 285.879087][T18205] [ 285.882020][T18205] dump_stack_lvl+0xd6/0x122 [ 285.886821][T18205] dump_stack+0x11/0x1b [ 285.891070][T18205] should_fail+0x23c/0x250 [ 285.892288][T18212] FAULT_INJECTION: forcing a failure. [ 285.892288][T18212] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 285.895653][T18205] ? __alloc_file+0x2e/0x1a0 [ 285.913250][T18205] __should_failslab+0x81/0x90 [ 285.918020][T18205] should_failslab+0x5/0x20 [ 285.922800][T18205] kmem_cache_alloc+0x4f/0x320 [ 285.927558][T18205] __alloc_file+0x2e/0x1a0 [ 285.931995][T18205] alloc_empty_file+0xcd/0x1c0 [ 285.936807][T18205] path_openat+0x6a/0x1f30 [ 285.941214][T18205] ? copy_page_from_iter_atomic+0x4a5/0xcd0 [ 285.947182][T18205] ? folio_mark_dirty+0x84/0xe0 [ 285.952100][T18205] ? unlock_page+0x37/0x50 [ 285.956540][T18205] ? inode_to_bdi+0x43/0xa0 [ 285.961043][T18205] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 285.967317][T18205] ? generic_perform_write+0x397/0x400 [ 285.972773][T18205] do_filp_open+0x105/0x220 [ 285.977336][T18205] do_sys_openat2+0xb5/0x2b0 [ 285.981917][T18205] __x64_sys_openat+0xef/0x110 [ 285.986696][T18205] do_syscall_64+0x44/0xd0 [ 285.991174][T18205] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 285.997236][T18205] RIP: 0033:0x7fd2e4e2cf74 [ 286.001779][T18205] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 286.021463][T18205] RSP: 002b:00007fd2e3fefeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 286.029953][T18205] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e2cf74 05:15:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1002}, 0x80) 05:15:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f90000000001000000000000", 0x2b}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 286.037940][T18205] RDX: 0000000000000002 RSI: 00007fd2e3feffe0 RDI: 00000000ffffff9c [ 286.045915][T18205] RBP: 00007fd2e3feffe0 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 286.053975][T18205] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 286.061943][T18205] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 286.069998][T18205] [ 286.073006][T18212] CPU: 0 PID: 18212 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 286.083590][T18212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.093913][T18212] Call Trace: [ 286.097202][T18212] [ 286.100228][T18212] dump_stack_lvl+0xd6/0x122 [ 286.104943][T18212] dump_stack+0x11/0x1b [ 286.109179][T18212] should_fail+0x23c/0x250 [ 286.113651][T18212] should_fail_usercopy+0x16/0x20 [ 286.118707][T18212] _copy_from_user+0x1c/0xd0 [ 286.123315][T18212] __se_sys_memfd_create+0x125/0x350 [ 286.128683][T18212] __x64_sys_memfd_create+0x2d/0x40 [ 286.133898][T18212] do_syscall_64+0x44/0xd0 [ 286.138406][T18212] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.144372][T18212] RIP: 0033:0x7f89d6e82059 [ 286.148777][T18212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 286.168568][T18212] RSP: 002b:00007f89d5ff7f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 286.176983][T18212] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f89d6e82059 [ 286.184941][T18212] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007f89d6edb1e0 05:15:10 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 16) 05:15:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:10 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1100}, 0x80) [ 286.192945][T18212] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007f89d5ff81d0 [ 286.200906][T18212] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 286.208945][T18212] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 286.216967][T18212] [ 286.226042][ T6282] blk_print_req_error: 38 callbacks suppressed [ 286.226058][ T6282] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 286.245661][T18221] FAULT_INJECTION: forcing a failure. [ 286.245661][T18221] name failslab, interval 1, probability 0, space 0, times 0 [ 286.258339][T18221] CPU: 0 PID: 18221 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 286.268855][T18221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.279040][T18221] Call Trace: [ 286.282312][T18221] [ 286.285232][T18221] dump_stack_lvl+0xd6/0x122 [ 286.289821][T18221] dump_stack+0x11/0x1b [ 286.293970][T18221] should_fail+0x23c/0x250 [ 286.299309][T18221] ? security_file_alloc+0x30/0x190 [ 286.304641][T18221] __should_failslab+0x81/0x90 [ 286.309581][T18221] should_failslab+0x5/0x20 [ 286.314103][T18221] kmem_cache_alloc+0x4f/0x320 [ 286.318917][T18221] security_file_alloc+0x30/0x190 [ 286.323941][T18221] __alloc_file+0x83/0x1a0 [ 286.328356][T18221] alloc_empty_file+0xcd/0x1c0 [ 286.333141][T18221] path_openat+0x6a/0x1f30 [ 286.337611][T18221] ? copy_page_from_iter_atomic+0x4a5/0xcd0 [ 286.343525][T18221] ? folio_mark_dirty+0x84/0xe0 [ 286.348378][T18221] ? unlock_page+0x37/0x50 [ 286.352865][T18221] ? inode_to_bdi+0x43/0xa0 [ 286.357431][T18221] ? balance_dirty_pages_ratelimited+0x47/0x280 [ 286.363674][T18221] ? generic_perform_write+0x397/0x400 [ 286.369170][T18221] do_filp_open+0x105/0x220 [ 286.373696][T18221] do_sys_openat2+0xb5/0x2b0 [ 286.378297][T18221] __x64_sys_openat+0xef/0x110 [ 286.383052][T18221] do_syscall_64+0x44/0xd0 [ 286.387463][T18221] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.393373][T18221] RIP: 0033:0x7fd2e4e2cf74 [ 286.397809][T18221] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 286.417456][T18221] RSP: 002b:00007fd2e3fefeb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 286.425883][T18221] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e2cf74 [ 286.433852][T18221] RDX: 0000000000000002 RSI: 00007fd2e3feffe0 RDI: 00000000ffffff9c 05:15:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:11 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1200}, 0x80) 05:15:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 3) 05:15:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 17) [ 286.441810][T18221] RBP: 00007fd2e3feffe0 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 286.449809][T18221] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 286.457787][T18221] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 286.465794][T18221] [ 286.468859][ T6261] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 286.482111][T18224] loop5: detected capacity change from 0 to 64 [ 286.523753][T18231] loop1: detected capacity change from 0 to 64 [ 286.527890][T18233] FAULT_INJECTION: forcing a failure. [ 286.527890][T18233] name failslab, interval 1, probability 0, space 0, times 0 [ 286.536211][T18235] FAULT_INJECTION: forcing a failure. [ 286.536211][T18235] name failslab, interval 1, probability 0, space 0, times 0 [ 286.542567][T18233] CPU: 1 PID: 18233 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 286.565719][T18233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.575766][T18233] Call Trace: [ 286.579035][T18233] [ 286.581973][T18233] dump_stack_lvl+0xd6/0x122 [ 286.586635][T18233] dump_stack+0x11/0x1b [ 286.590784][T18233] should_fail+0x23c/0x250 [ 286.595191][T18233] ? kzalloc+0x16/0x20 [ 286.599317][T18233] __should_failslab+0x81/0x90 [ 286.604077][T18233] should_failslab+0x5/0x20 [ 286.608660][T18233] __kmalloc+0x6f/0x370 [ 286.612808][T18233] ? _atomic_dec_and_lock+0x60/0xc0 [ 286.618026][T18233] kzalloc+0x16/0x20 [ 286.621912][T18233] alloc_workqueue+0x12f/0xad0 [ 286.626707][T18233] ? __rcu_read_unlock+0x5c/0x290 [ 286.631810][T18233] ? preempt_count_add+0x4e/0x90 [ 286.636954][T18233] ? _raw_spin_unlock+0x2e/0x50 [ 286.641984][T18233] ? bd_prepare_to_claim+0x1ac/0x200 [ 286.647295][T18233] loop_configure+0x72f/0xf50 [ 286.652051][T18233] lo_ioctl+0x633/0x1280 [ 286.656283][T18233] ? folio_mark_dirty+0x84/0xe0 [ 286.661134][T18233] ? unlock_page+0x37/0x50 [ 286.665620][T18233] ? __rcu_read_unlock+0x5c/0x290 [ 286.670659][T18233] ? blkdev_common_ioctl+0x438/0x1060 [ 286.676030][T18233] ? selinux_file_ioctl+0x522/0x590 [ 286.681232][T18233] ? do_vfs_ioctl+0x819/0x14a0 [ 286.686010][T18233] ? lo_release+0x1e0/0x1e0 [ 286.690727][T18233] blkdev_ioctl+0x20e/0x440 [ 286.695239][T18233] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 286.701009][T18233] __se_sys_ioctl+0xcb/0x140 [ 286.705662][T18233] __x64_sys_ioctl+0x3f/0x50 [ 286.710392][T18233] do_syscall_64+0x44/0xd0 [ 286.714823][T18233] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.720916][T18233] RIP: 0033:0x7fd2e4e79e17 [ 286.725322][T18233] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 286.745203][T18233] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 286.753679][T18233] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 286.761648][T18233] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 05:15:11 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1800}, 0x80) 05:15:11 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 18) [ 286.769666][T18233] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 286.777628][T18233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 286.785595][T18233] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 286.793583][T18233] [ 286.796593][T18235] CPU: 0 PID: 18235 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 286.807270][T18235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.817373][T18235] Call Trace: [ 286.820660][T18235] [ 286.823591][T18235] dump_stack_lvl+0xd6/0x122 [ 286.824467][T18240] FAULT_INJECTION: forcing a failure. [ 286.824467][T18240] name failslab, interval 1, probability 0, space 0, times 0 [ 286.828237][T18235] dump_stack+0x11/0x1b [ 286.844999][T18235] should_fail+0x23c/0x250 [ 286.849429][T18235] ? shmem_alloc_inode+0x22/0x30 [ 286.854412][T18235] __should_failslab+0x81/0x90 [ 286.859184][T18235] ? shmem_match+0xa0/0xa0 [ 286.863666][T18235] should_failslab+0x5/0x20 [ 286.868236][T18235] kmem_cache_alloc+0x4f/0x320 [ 286.873100][T18235] ? shmem_match+0xa0/0xa0 [ 286.877695][T18235] shmem_alloc_inode+0x22/0x30 [ 286.882534][T18235] new_inode_pseudo+0x38/0x190 [ 286.887344][T18235] new_inode+0x21/0x100 [ 286.891510][T18235] shmem_get_inode+0xb7/0x490 [ 286.896244][T18235] __shmem_file_setup+0xf1/0x1d0 [ 286.901188][T18235] shmem_file_setup+0x37/0x40 [ 286.905867][T18235] __se_sys_memfd_create+0x1c1/0x350 [ 286.911180][T18235] __x64_sys_memfd_create+0x2d/0x40 [ 286.916392][T18235] do_syscall_64+0x44/0xd0 [ 286.920803][T18235] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 286.926757][T18235] RIP: 0033:0x7f89d6e82059 [ 286.931323][T18235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 286.950999][T18235] RSP: 002b:00007f89d5ff7f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 286.959461][T18235] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f89d6e82059 [ 286.967439][T18235] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007f89d6edb1e0 [ 286.975414][T18235] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007f89d5ff81d0 [ 286.983432][T18235] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 286.991398][T18235] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 286.999396][T18235] [ 287.002451][T18240] CPU: 1 PID: 18240 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 287.013058][T18240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.023206][T18240] Call Trace: [ 287.026490][T18240] [ 287.029422][T18240] dump_stack_lvl+0xd6/0x122 [ 287.034028][T18240] dump_stack+0x11/0x1b [ 287.038246][T18240] should_fail+0x23c/0x250 [ 287.042685][T18240] ? alloc_workqueue+0x15d/0xad0 [ 287.047628][T18240] __should_failslab+0x81/0x90 [ 287.052403][T18240] should_failslab+0x5/0x20 [ 287.057087][T18240] kmem_cache_alloc_trace+0x52/0x350 [ 287.062391][T18240] ? kzalloc+0x16/0x20 [ 287.066494][T18240] alloc_workqueue+0x15d/0xad0 [ 287.071298][T18240] ? __rcu_read_unlock+0x5c/0x290 [ 287.076347][T18240] ? preempt_count_add+0x4e/0x90 [ 287.081291][T18240] ? _raw_spin_unlock+0x2e/0x50 [ 287.086141][T18240] ? bd_prepare_to_claim+0x1ac/0x200 [ 287.091435][T18240] loop_configure+0x72f/0xf50 [ 287.096137][T18240] lo_ioctl+0x633/0x1280 [ 287.100373][T18240] ? folio_mark_dirty+0x84/0xe0 [ 287.105220][T18240] ? unlock_page+0x37/0x50 [ 287.109697][T18240] ? __rcu_read_unlock+0x5c/0x290 [ 287.114719][T18240] ? blkdev_common_ioctl+0x438/0x1060 [ 287.120086][T18240] ? selinux_file_ioctl+0x522/0x590 [ 287.125281][T18240] ? do_vfs_ioctl+0x819/0x14a0 [ 287.130131][T18240] ? lo_release+0x1e0/0x1e0 [ 287.134681][T18240] blkdev_ioctl+0x20e/0x440 [ 287.139181][T18240] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 287.144711][T18240] __se_sys_ioctl+0xcb/0x140 [ 287.149309][T18240] __x64_sys_ioctl+0x3f/0x50 [ 287.153934][T18240] do_syscall_64+0x44/0xd0 [ 287.158343][T18240] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.164247][T18240] RIP: 0033:0x7fd2e4e79e17 [ 287.168792][T18240] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 287.188499][T18240] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.196923][T18240] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 287.204891][T18240] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 287.212857][T18240] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 05:15:11 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 4) 05:15:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 287.220929][T18240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 287.228895][T18240] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 287.237190][T18240] [ 287.268917][T18243] FAULT_INJECTION: forcing a failure. [ 287.268917][T18243] name failslab, interval 1, probability 0, space 0, times 0 [ 287.281556][T18243] CPU: 1 PID: 18243 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 287.285688][T18247] loop5: detected capacity change from 0 to 64 [ 287.292134][T18243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.292147][T18243] Call Trace: [ 287.292154][T18243] [ 287.292161][T18243] dump_stack_lvl+0xd6/0x122 [ 287.292196][T18243] dump_stack+0x11/0x1b [ 287.292282][T18243] should_fail+0x23c/0x250 [ 287.310117][T18251] FAULT_INJECTION: forcing a failure. [ 287.310117][T18251] name failslab, interval 1, probability 0, space 0, times 0 [ 287.311824][T18243] ? security_inode_alloc+0x30/0x180 [ 287.345942][T18243] __should_failslab+0x81/0x90 [ 287.350838][T18243] should_failslab+0x5/0x20 [ 287.355360][T18243] kmem_cache_alloc+0x4f/0x320 [ 287.360258][T18243] security_inode_alloc+0x30/0x180 [ 287.365554][T18243] inode_init_always+0x214/0x3e0 [ 287.370555][T18243] ? shmem_match+0xa0/0xa0 [ 287.375079][T18243] new_inode_pseudo+0x6f/0x190 [ 287.379912][T18243] new_inode+0x21/0x100 [ 287.384219][T18243] shmem_get_inode+0xb7/0x490 [ 287.388950][T18243] __shmem_file_setup+0xf1/0x1d0 [ 287.393906][T18243] shmem_file_setup+0x37/0x40 [ 287.398585][T18243] __se_sys_memfd_create+0x1c1/0x350 [ 287.403900][T18243] __x64_sys_memfd_create+0x2d/0x40 [ 287.409120][T18243] do_syscall_64+0x44/0xd0 [ 287.413578][T18243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.419501][T18243] RIP: 0033:0x7f89d6e82059 [ 287.423910][T18243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 287.443508][T18243] RSP: 002b:00007f89d5ff7f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 287.451909][T18243] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f89d6e82059 [ 287.459924][T18243] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007f89d6edb1e0 05:15:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) 05:15:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 19) [ 287.467881][T18243] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007f89d5ff81d0 [ 287.475956][T18243] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 287.483916][T18243] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 287.491931][T18243] [ 287.494940][T18251] CPU: 0 PID: 18251 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 287.505485][T18251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.509627][T18231] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 287.515553][T18251] Call Trace: [ 287.515562][T18251] [ 287.515568][T18251] dump_stack_lvl+0xd6/0x122 [ 287.535384][T18251] dump_stack+0x11/0x1b [ 287.539602][T18251] should_fail+0x23c/0x250 [ 287.544052][T18251] ? kzalloc+0x16/0x20 [ 287.548127][T18251] __should_failslab+0x81/0x90 [ 287.552900][T18251] should_failslab+0x5/0x20 [ 287.557444][T18251] __kmalloc+0x6f/0x370 [ 287.561604][T18251] ? number+0xa13/0xb60 [ 287.565751][T18251] kzalloc+0x16/0x20 [ 287.569636][T18251] apply_wqattrs_prepare+0x3a/0x630 [ 287.574817][T18251] ? vsnprintf+0xe8f/0xed0 [ 287.579322][T18251] apply_workqueue_attrs+0x9e/0x100 [ 287.584511][T18251] alloc_workqueue+0x777/0xad0 [ 287.589269][T18251] ? preempt_count_add+0x4e/0x90 [ 287.594197][T18251] ? _raw_spin_unlock+0x2e/0x50 [ 287.599174][T18251] ? bd_prepare_to_claim+0x1ac/0x200 [ 287.604500][T18251] loop_configure+0x72f/0xf50 [ 287.609206][T18251] lo_ioctl+0x633/0x1280 [ 287.613483][T18251] ? folio_mark_dirty+0x84/0xe0 [ 287.618373][T18251] ? unlock_page+0x37/0x50 [ 287.622901][T18251] ? __rcu_read_unlock+0x5c/0x290 [ 287.628067][T18251] ? blkdev_common_ioctl+0x438/0x1060 [ 287.633517][T18251] ? selinux_file_ioctl+0x522/0x590 [ 287.638722][T18251] ? do_vfs_ioctl+0x819/0x14a0 [ 287.643547][T18251] ? lo_release+0x1e0/0x1e0 [ 287.648132][T18251] blkdev_ioctl+0x20e/0x440 [ 287.652674][T18251] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 287.658203][T18251] __se_sys_ioctl+0xcb/0x140 [ 287.662776][T18251] __x64_sys_ioctl+0x3f/0x50 [ 287.667345][T18251] do_syscall_64+0x44/0xd0 [ 287.671746][T18251] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.677792][T18251] RIP: 0033:0x7fd2e4e79e17 [ 287.682239][T18251] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 287.702231][T18251] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.710702][T18251] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 05:15:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2500}, 0x80) 05:15:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6040000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 5) 05:15:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f9000000000100000000000000", 0x2c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:12 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 20) [ 287.718675][T18251] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 287.726631][T18251] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 287.734589][T18251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 287.742886][T18251] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 287.750847][T18251] 05:15:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4000}, 0x80) [ 287.795095][T18257] FAULT_INJECTION: forcing a failure. [ 287.795095][T18257] name failslab, interval 1, probability 0, space 0, times 0 [ 287.807889][T18257] CPU: 0 PID: 18257 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 287.810672][T18260] FAULT_INJECTION: forcing a failure. [ 287.810672][T18260] name failslab, interval 1, probability 0, space 0, times 0 [ 287.818394][T18257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.818407][T18257] Call Trace: [ 287.818414][T18257] [ 287.818421][T18257] dump_stack_lvl+0xd6/0x122 [ 287.818453][T18257] dump_stack+0x11/0x1b [ 287.855932][T18257] should_fail+0x23c/0x250 [ 287.860434][T18257] ? __d_alloc+0x36/0x370 [ 287.864831][T18257] __should_failslab+0x81/0x90 [ 287.869688][T18257] should_failslab+0x5/0x20 [ 287.874206][T18257] kmem_cache_alloc+0x4f/0x320 [ 287.878962][T18257] ? security_inode_alloc+0x138/0x180 [ 287.884357][T18257] ? __init_rwsem+0x59/0x70 [ 287.888853][T18257] __d_alloc+0x36/0x370 [ 287.893004][T18257] ? debug_smp_processor_id+0x18/0x20 [ 287.898410][T18257] d_alloc_pseudo+0x1a/0x50 [ 287.902918][T18257] alloc_file_pseudo+0x77/0x150 [ 287.907892][T18257] __shmem_file_setup+0x14c/0x1d0 [ 287.912929][T18257] shmem_file_setup+0x37/0x40 [ 287.917679][T18257] __se_sys_memfd_create+0x1c1/0x350 [ 287.923037][T18257] __x64_sys_memfd_create+0x2d/0x40 [ 287.928300][T18257] do_syscall_64+0x44/0xd0 [ 287.932886][T18257] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 287.938897][T18257] RIP: 0033:0x7f89d6e82059 [ 287.943301][T18257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 287.962900][T18257] RSP: 002b:00007f89d5ff7f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 287.971302][T18257] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f89d6e82059 [ 287.979263][T18257] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007f89d6edb1e0 [ 287.987228][T18257] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007f89d5ff81d0 [ 287.995262][T18257] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 288.003227][T18257] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 288.011251][T18257] [ 288.014272][T18260] CPU: 1 PID: 18260 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 288.024839][T18260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.035006][T18260] Call Trace: [ 288.038294][T18260] [ 288.041226][T18260] dump_stack_lvl+0xd6/0x122 [ 288.045839][T18260] dump_stack+0x11/0x1b [ 288.050004][T18260] should_fail+0x23c/0x250 [ 288.054529][T18260] ? apply_wqattrs_prepare+0x5f/0x630 [ 288.059984][T18260] __should_failslab+0x81/0x90 [ 288.064839][T18260] should_failslab+0x5/0x20 [ 288.069359][T18260] kmem_cache_alloc_trace+0x52/0x350 [ 288.072616][T18268] FAULT_INJECTION: forcing a failure. [ 288.072616][T18268] name failslab, interval 1, probability 0, space 0, times 0 [ 288.074721][T18260] ? kzalloc+0x16/0x20 [ 288.074750][T18260] apply_wqattrs_prepare+0x5f/0x630 [ 288.074777][T18260] ? vsnprintf+0xe8f/0xed0 [ 288.100993][T18260] apply_workqueue_attrs+0x9e/0x100 [ 288.106428][T18260] alloc_workqueue+0x777/0xad0 [ 288.111191][T18260] ? preempt_count_add+0x4e/0x90 [ 288.116283][T18260] ? _raw_spin_unlock+0x2e/0x50 [ 288.121406][T18260] ? bd_prepare_to_claim+0x1ac/0x200 [ 288.126759][T18260] loop_configure+0x72f/0xf50 [ 288.131683][T18260] lo_ioctl+0x633/0x1280 [ 288.135915][T18260] ? folio_mark_dirty+0x84/0xe0 [ 288.140956][T18260] ? unlock_page+0x37/0x50 [ 288.145382][T18260] ? __rcu_read_unlock+0x5c/0x290 [ 288.150447][T18260] ? blkdev_common_ioctl+0x438/0x1060 [ 288.155819][T18260] ? selinux_file_ioctl+0x522/0x590 [ 288.161088][T18260] ? do_vfs_ioctl+0x819/0x14a0 [ 288.165843][T18260] ? lo_release+0x1e0/0x1e0 [ 288.170359][T18260] blkdev_ioctl+0x20e/0x440 [ 288.174903][T18260] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 288.180359][T18260] __se_sys_ioctl+0xcb/0x140 [ 288.185054][T18260] __x64_sys_ioctl+0x3f/0x50 [ 288.189653][T18260] do_syscall_64+0x44/0xd0 [ 288.194071][T18260] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.199968][T18260] RIP: 0033:0x7fd2e4e79e17 [ 288.204557][T18260] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 288.224252][T18260] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 288.232757][T18260] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 05:15:12 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 6) 05:15:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4800}, 0x80) 05:15:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) [ 288.240902][T18260] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 288.248879][T18260] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 288.257081][T18260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 288.265041][T18260] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 288.273004][T18260] [ 288.276019][T18268] CPU: 0 PID: 18268 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 288.286705][T18268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.296761][T18268] Call Trace: [ 288.300042][T18268] [ 288.302970][T18268] dump_stack_lvl+0xd6/0x122 [ 288.307593][T18268] dump_stack+0x11/0x1b [ 288.311753][T18268] should_fail+0x23c/0x250 [ 288.316185][T18268] ? __alloc_file+0x2e/0x1a0 [ 288.320865][T18268] __should_failslab+0x81/0x90 [ 288.325700][T18268] should_failslab+0x5/0x20 [ 288.330236][T18268] kmem_cache_alloc+0x4f/0x320 [ 288.335106][T18268] __alloc_file+0x2e/0x1a0 [ 288.339525][T18268] alloc_empty_file+0xcd/0x1c0 [ 288.345028][T18268] alloc_file+0x3a/0x280 [ 288.349420][T18268] alloc_file_pseudo+0xfa/0x150 [ 288.354383][T18268] __shmem_file_setup+0x14c/0x1d0 [ 288.359418][T18268] shmem_file_setup+0x37/0x40 [ 288.364097][T18268] __se_sys_memfd_create+0x1c1/0x350 [ 288.369492][T18268] __x64_sys_memfd_create+0x2d/0x40 [ 288.374963][T18268] do_syscall_64+0x44/0xd0 [ 288.379469][T18268] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.385392][T18268] RIP: 0033:0x7f89d6e82059 [ 288.389797][T18268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 288.409415][T18268] RSP: 002b:00007f89d5ff7f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 288.417926][T18268] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f89d6e82059 [ 288.425903][T18268] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007f89d6edb1e0 [ 288.434871][T18268] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007f89d5ff81d0 05:15:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4c00}, 0x80) 05:15:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 288.442885][T18268] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 288.451024][T18268] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 288.459169][T18268] [ 288.489098][ T6282] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 288.505624][ T6261] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 288.521243][T18276] loop5: detected capacity change from 0 to 64 [ 288.533722][T18276] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 288.549843][T18276] FAT-fs (loop5): Directory bread(block 1986) failed [ 288.556785][T18276] FAT-fs (loop5): Directory bread(block 1987) failed [ 288.564024][T18276] FAT-fs (loop5): Directory bread(block 1988) failed [ 288.571559][T18276] FAT-fs (loop5): Directory bread(block 1989) failed [ 288.578683][T18276] FAT-fs (loop5): Directory bread(block 1990) failed 05:15:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:13 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 21) 05:15:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 7) 05:15:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6800}, 0x80) [ 288.585526][T18276] FAT-fs (loop5): Directory bread(block 1991) failed [ 288.592610][T18276] FAT-fs (loop5): Directory bread(block 1992) failed [ 288.600159][T18276] FAT-fs (loop5): Directory bread(block 1993) failed [ 288.607021][T18276] FAT-fs (loop5): Directory bread(block 1994) failed [ 288.613974][T18276] FAT-fs (loop5): Directory bread(block 1995) failed 05:15:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8800000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 288.639995][T18282] FAULT_INJECTION: forcing a failure. [ 288.639995][T18282] name failslab, interval 1, probability 0, space 0, times 0 [ 288.644604][T18285] FAULT_INJECTION: forcing a failure. [ 288.644604][T18285] name failslab, interval 1, probability 0, space 0, times 0 [ 288.652652][T18282] CPU: 0 PID: 18282 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 288.675849][T18282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.685897][T18282] Call Trace: [ 288.689169][T18282] [ 288.692087][T18282] dump_stack_lvl+0xd6/0x122 [ 288.696691][T18282] dump_stack+0x11/0x1b [ 288.700843][T18282] should_fail+0x23c/0x250 [ 288.705257][T18282] ? security_file_alloc+0x30/0x190 [ 288.710539][T18282] __should_failslab+0x81/0x90 [ 288.715332][T18282] should_failslab+0x5/0x20 [ 288.719830][T18282] kmem_cache_alloc+0x4f/0x320 [ 288.724601][T18282] security_file_alloc+0x30/0x190 [ 288.729623][T18282] __alloc_file+0x83/0x1a0 [ 288.734137][T18282] alloc_empty_file+0xcd/0x1c0 [ 288.738956][T18282] alloc_file+0x3a/0x280 [ 288.743208][T18282] alloc_file_pseudo+0xfa/0x150 [ 288.748102][T18282] __shmem_file_setup+0x14c/0x1d0 [ 288.753203][T18282] shmem_file_setup+0x37/0x40 [ 288.757919][T18282] __se_sys_memfd_create+0x1c1/0x350 [ 288.763293][T18282] __x64_sys_memfd_create+0x2d/0x40 [ 288.768631][T18282] do_syscall_64+0x44/0xd0 [ 288.773126][T18282] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 288.779013][T18282] RIP: 0033:0x7f89d6e82059 [ 288.783496][T18282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 288.803208][T18282] RSP: 002b:00007f89d5ff7f28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 288.811699][T18282] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007f89d6e82059 [ 288.819656][T18282] RDX: 0000000000008000 RSI: 0000000000000000 RDI: 00007f89d6edb1e0 [ 288.827633][T18282] RBP: 0000000000000002 R08: 0000000000004000 R09: 00007f89d5ff81d0 [ 288.835680][T18282] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000008100000 [ 288.843642][T18282] R13: 0000000020000100 R14: 0000000000008000 R15: 0000000020000440 [ 288.851621][T18282] [ 288.854731][T18285] CPU: 1 PID: 18285 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 288.865389][T18285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.875526][T18285] Call Trace: [ 288.878796][T18285] [ 288.881712][T18285] dump_stack_lvl+0xd6/0x122 [ 288.886304][T18285] dump_stack+0x11/0x1b [ 288.890538][T18285] should_fail+0x23c/0x250 [ 288.894949][T18285] ? apply_wqattrs_prepare+0xbe/0x630 [ 288.900315][T18285] __should_failslab+0x81/0x90 [ 288.905081][T18285] should_failslab+0x5/0x20 [ 288.909579][T18285] kmem_cache_alloc_trace+0x52/0x350 [ 288.914857][T18285] ? apply_wqattrs_prepare+0x5f/0x630 [ 288.920287][T18285] apply_wqattrs_prepare+0xbe/0x630 [ 288.925503][T18285] ? vsnprintf+0xe8f/0xed0 [ 288.929916][T18285] apply_workqueue_attrs+0x9e/0x100 [ 288.935202][T18285] alloc_workqueue+0x777/0xad0 [ 288.940013][T18285] ? preempt_count_add+0x4e/0x90 [ 288.944997][T18285] ? _raw_spin_unlock+0x2e/0x50 [ 288.949910][T18285] ? bd_prepare_to_claim+0x1ac/0x200 [ 288.955282][T18285] loop_configure+0x72f/0xf50 [ 288.959955][T18285] lo_ioctl+0x633/0x1280 [ 288.964188][T18285] ? folio_mark_dirty+0x84/0xe0 [ 288.969030][T18285] ? unlock_page+0x37/0x50 [ 288.973436][T18285] ? __rcu_read_unlock+0x5c/0x290 [ 288.978475][T18285] ? blkdev_common_ioctl+0x438/0x1060 [ 288.983845][T18285] ? selinux_file_ioctl+0x522/0x590 [ 288.989486][T18285] ? do_vfs_ioctl+0x819/0x14a0 [ 288.994272][T18285] ? lo_release+0x1e0/0x1e0 [ 288.998768][T18285] blkdev_ioctl+0x20e/0x440 [ 289.003285][T18285] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 289.008741][T18285] __se_sys_ioctl+0xcb/0x140 [ 289.013322][T18285] __x64_sys_ioctl+0x3f/0x50 [ 289.017933][T18285] do_syscall_64+0x44/0xd0 [ 289.022364][T18285] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.028343][T18285] RIP: 0033:0x7fd2e4e79e17 [ 289.032766][T18285] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 289.052412][T18285] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.060921][T18285] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 289.068882][T18285] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 289.076985][T18285] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 05:15:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c00}, 0x80) 05:15:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x18000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x7400}, 0x80) 05:15:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 8) [ 289.084977][T18285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 289.092941][T18285] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 289.100905][T18285] [ 289.113022][T18288] loop1: detected capacity change from 0 to 64 [ 289.141727][T18296] FAULT_INJECTION: forcing a failure. [ 289.141727][T18296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 289.155224][T18296] CPU: 1 PID: 18296 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 289.165843][T18296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.175890][T18296] Call Trace: [ 289.179210][T18296] [ 289.182147][T18296] dump_stack_lvl+0xd6/0x122 [ 289.186736][T18296] dump_stack+0x11/0x1b [ 289.190892][T18296] should_fail+0x23c/0x250 [ 289.195301][T18296] __alloc_pages+0x102/0x330 [ 289.199883][T18296] alloc_pages_vma+0x67e/0x810 [ 289.204827][T18296] shmem_getpage_gfp+0x8b4/0x12c0 [ 289.209848][T18296] shmem_write_begin+0x7e/0x100 [ 289.214690][T18296] generic_perform_write+0x1c8/0x400 [ 289.220113][T18296] ? current_time+0xed/0x1a0 [ 289.224712][T18296] __generic_file_write_iter+0xf7/0x2b0 [ 289.230427][T18296] ? generic_write_checks+0x250/0x290 [ 289.235940][T18296] generic_file_write_iter+0x75/0x130 [ 289.241375][T18296] vfs_write+0x7f5/0x950 [ 289.245658][T18296] __x64_sys_pwrite64+0xf5/0x150 [ 289.250645][T18296] do_syscall_64+0x44/0xd0 [ 289.255125][T18296] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.261223][T18296] RIP: 0033:0x7f89d6e35027 [ 289.265737][T18296] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b 05:15:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x7a00}, 0x80) [ 289.285601][T18296] RSP: 002b:00007f89d5ff7f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 289.294057][T18296] RAX: ffffffffffffffda RBX: 00007f89d6ecb9c8 RCX: 00007f89d6e35027 [ 289.302051][T18296] RDX: 000000000000002d RSI: 0000000020010000 RDI: 0000000000000004 [ 289.310011][T18296] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007f89d5ff81d0 [ 289.318074][T18296] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 [ 289.326115][T18296] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 289.334173][T18296] 05:15:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x26000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 289.342684][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 289.354817][T18299] loop5: detected capacity change from 0 to 64 [ 289.370592][T18296] loop4: detected capacity change from 0 to 64 [ 289.385229][T18296] FAT-fs (loop4): bogus number of reserved sectors [ 289.391796][T18296] FAT-fs (loop4): Can't find a valid FAT filesystem [ 289.401628][T18299] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 289.419823][T18299] FAT-fs (loop5): Directory bread(block 1986) failed [ 289.426620][T18299] FAT-fs (loop5): Directory bread(block 1987) failed [ 289.433729][T18299] FAT-fs (loop5): Directory bread(block 1988) failed 05:15:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 22) 05:15:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb000}, 0x80) 05:15:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, 0x0) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x40, 0x0) 05:15:14 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 9) [ 289.440812][T18299] FAT-fs (loop5): Directory bread(block 1989) failed [ 289.448197][T18299] FAT-fs (loop5): Directory bread(block 1990) failed [ 289.455135][T18299] FAT-fs (loop5): Directory bread(block 1991) failed [ 289.463049][T18299] FAT-fs (loop5): Directory bread(block 1992) failed [ 289.470781][T18299] FAT-fs (loop5): Directory bread(block 1993) failed [ 289.478053][T18299] FAT-fs (loop5): Directory bread(block 1994) failed [ 289.485407][T18299] FAT-fs (loop5): Directory bread(block 1995) failed 05:15:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xc602}, 0x80) 05:15:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xed00}, 0x80) [ 289.510444][T18308] FAULT_INJECTION: forcing a failure. [ 289.510444][T18308] name failslab, interval 1, probability 0, space 0, times 0 [ 289.523231][T18308] CPU: 1 PID: 18308 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 289.533742][T18308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.543806][T18308] Call Trace: [ 289.547106][T18308] [ 289.550034][T18308] dump_stack_lvl+0xd6/0x122 [ 289.554632][T18308] dump_stack+0x11/0x1b 05:15:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000800, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xff00}, 0x80) 05:15:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1ed6cc}, 0x80) [ 289.558872][T18308] should_fail+0x23c/0x250 [ 289.563299][T18308] __should_failslab+0x81/0x90 [ 289.568072][T18308] should_failslab+0x5/0x20 [ 289.572734][T18308] kmem_cache_alloc_node+0x61/0x2d0 [ 289.577947][T18308] ? should_fail+0xd6/0x250 [ 289.582538][T18308] ? should_fail+0xd6/0x250 [ 289.587099][T18308] ? alloc_unbound_pwq+0x3e6/0x780 [ 289.592231][T18308] alloc_unbound_pwq+0x3e6/0x780 [ 289.597229][T18308] apply_wqattrs_prepare+0x1ed/0x630 [ 289.602596][T18308] ? vsnprintf+0xe8f/0xed0 [ 289.607080][T18308] apply_workqueue_attrs+0x9e/0x100 [ 289.612313][T18308] alloc_workqueue+0x777/0xad0 [ 289.617152][T18308] ? preempt_count_add+0x4e/0x90 [ 289.622136][T18308] ? _raw_spin_unlock+0x2e/0x50 [ 289.627038][T18308] ? bd_prepare_to_claim+0x1ac/0x200 [ 289.631636][T18327] FAULT_INJECTION: forcing a failure. [ 289.631636][T18327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 289.632418][T18308] loop_configure+0x72f/0xf50 [ 289.650079][T18308] lo_ioctl+0x633/0x1280 [ 289.654361][T18308] ? folio_mark_dirty+0x84/0xe0 [ 289.659212][T18308] ? unlock_page+0x37/0x50 [ 289.663784][T18308] ? __rcu_read_unlock+0x5c/0x290 [ 289.668804][T18308] ? blkdev_common_ioctl+0x438/0x1060 [ 289.674279][T18308] ? selinux_file_ioctl+0x522/0x590 [ 289.679512][T18308] ? do_vfs_ioctl+0x819/0x14a0 [ 289.684298][T18308] ? lo_release+0x1e0/0x1e0 [ 289.688794][T18308] blkdev_ioctl+0x20e/0x440 [ 289.693334][T18308] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 289.698820][T18308] __se_sys_ioctl+0xcb/0x140 [ 289.703571][T18308] __x64_sys_ioctl+0x3f/0x50 [ 289.708147][T18308] do_syscall_64+0x44/0xd0 [ 289.712556][T18308] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.718444][T18308] RIP: 0033:0x7fd2e4e79e17 [ 289.722848][T18308] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 289.742442][T18308] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 289.750963][T18308] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 289.759030][T18308] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 289.766995][T18308] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 289.775114][T18308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 289.783074][T18308] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 289.791088][T18308] [ 289.794114][T18327] CPU: 0 PID: 18327 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 289.804617][T18327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.814670][T18327] Call Trace: [ 289.817970][T18327] [ 289.820888][T18327] dump_stack_lvl+0xd6/0x122 [ 289.825544][T18327] dump_stack+0x11/0x1b [ 289.829729][T18327] should_fail+0x23c/0x250 [ 289.834153][T18327] should_fail_usercopy+0x16/0x20 [ 289.839198][T18327] copy_page_from_iter_atomic+0x2f1/0xcd0 [ 289.844964][T18327] ? shmem_write_begin+0x7e/0x100 [ 289.849993][T18327] generic_perform_write+0x211/0x400 [ 289.855306][T18327] ? current_time+0xed/0x1a0 [ 289.859893][T18327] __generic_file_write_iter+0xf7/0x2b0 [ 289.865460][T18327] ? generic_write_checks+0x250/0x290 [ 289.870917][T18327] generic_file_write_iter+0x75/0x130 [ 289.876324][T18327] vfs_write+0x7f5/0x950 [ 289.880558][T18327] __x64_sys_pwrite64+0xf5/0x150 [ 289.885579][T18327] do_syscall_64+0x44/0xd0 [ 289.889986][T18327] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 289.895897][T18327] RIP: 0033:0x7f89d6e35027 [ 289.900331][T18327] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 289.920021][T18327] RSP: 002b:00007f89d5ff7f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 289.928581][T18327] RAX: ffffffffffffffda RBX: 00007f89d6ecb9c8 RCX: 00007f89d6e35027 [ 289.936555][T18327] RDX: 000000000000002d RSI: 0000000020010000 RDI: 0000000000000004 [ 289.944589][T18327] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007f89d5ff81d0 [ 289.952738][T18327] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000004 05:15:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x73000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x200000}, 0x80) 05:15:14 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 23) [ 289.960826][T18327] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 289.968798][T18327] [ 289.972567][T18328] loop1: detected capacity change from 0 to 64 [ 289.987570][T18327] loop4: detected capacity change from 0 to 64 [ 289.994495][ T6282] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 290.009036][T18327] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 290.013052][T18335] FAULT_INJECTION: forcing a failure. [ 290.013052][T18335] name failslab, interval 1, probability 0, space 0, times 0 [ 290.030702][T18335] CPU: 0 PID: 18335 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 290.033067][T18327] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 290.041209][T18335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.041225][T18335] Call Trace: 05:15:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x40, 0x0) [ 290.041231][T18335] [ 290.041238][T18335] dump_stack_lvl+0xd6/0x122 [ 290.041279][T18335] dump_stack+0x11/0x1b [ 290.041300][T18335] should_fail+0x23c/0x250 [ 290.041321][T18335] ? kobject_uevent_env+0x1d7/0xcc0 [ 290.041406][T18335] __should_failslab+0x81/0x90 [ 290.049329][T18327] FAT-fs (loop4): Filesystem has been set read-only [ 290.059345][T18335] should_failslab+0x5/0x20 [ 290.099838][T18335] kmem_cache_alloc_trace+0x52/0x350 [ 290.105285][T18335] ? pwq_adjust_max_active+0x4c5/0x4e0 [ 290.110742][T18335] kobject_uevent_env+0x1d7/0xcc0 [ 290.115749][T18335] ? alloc_workqueue+0xa18/0xad0 [ 290.120746][T18335] ? preempt_count_add+0x4e/0x90 [ 290.125741][T18335] ? _raw_spin_unlock+0x2e/0x50 [ 290.130666][T18335] ? bd_prepare_to_claim+0x1ac/0x200 [ 290.135941][T18335] disk_force_media_change+0xe3/0x170 [ 290.141501][T18335] loop_configure+0x76e/0xf50 [ 290.146290][T18335] lo_ioctl+0x633/0x1280 [ 290.150594][T18335] ? folio_mark_dirty+0x84/0xe0 [ 290.155440][T18335] ? unlock_page+0x37/0x50 [ 290.159859][T18335] ? __rcu_read_unlock+0x5c/0x290 [ 290.165067][T18335] ? blkdev_common_ioctl+0x438/0x1060 [ 290.170511][T18335] ? selinux_file_ioctl+0x522/0x590 [ 290.175699][T18335] ? do_vfs_ioctl+0x819/0x14a0 [ 290.181083][T18335] ? lo_release+0x1e0/0x1e0 [ 290.185601][T18335] blkdev_ioctl+0x20e/0x440 [ 290.190112][T18335] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 290.195622][T18335] __se_sys_ioctl+0xcb/0x140 [ 290.200300][T18335] __x64_sys_ioctl+0x3f/0x50 [ 290.204870][T18335] do_syscall_64+0x44/0xd0 [ 290.209274][T18335] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.215152][T18335] RIP: 0033:0x7fd2e4e79e17 [ 290.219559][T18335] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 290.239307][T18335] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.247704][T18335] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 290.255833][T18335] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 290.264797][T18335] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 290.273310][T18335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 290.281413][T18335] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 290.289457][T18335] [ 290.293902][T18335] loop3: detected capacity change from 0 to 64 [ 290.294698][T18336] loop5: detected capacity change from 0 to 64 [ 290.301064][T18335] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 290.316135][T18335] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 290.316430][T18336] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 290.324032][T18335] FAT-fs (loop3): Filesystem has been set read-only [ 290.347303][ T8029] I/O error, dev loop4, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 290.354717][T18336] FAT-fs (loop5): Directory bread(block 1986) failed 05:15:15 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 10) 05:15:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1000000}, 0x80) 05:15:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x83000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 290.356463][ T8029] buffer_io_error: 14 callbacks suppressed [ 290.356475][ T8029] Buffer I/O error on dev loop4, logical block 2, async page read [ 290.363450][T18336] FAT-fs (loop5): Directory bread(block 1987) failed [ 290.384227][ T6261] I/O error, dev loop3, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 290.393607][ T6261] Buffer I/O error on dev loop3, logical block 2, async page read [ 290.398998][T18342] FAULT_INJECTION: forcing a failure. 05:15:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 290.398998][T18342] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 290.414792][T18336] FAT-fs (loop5): Directory bread(block 1988) failed [ 290.414800][T18342] CPU: 1 PID: 18342 Comm: syz-executor.4 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 290.414839][T18342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.414851][T18342] Call Trace: [ 290.414857][T18342] [ 290.414913][T18336] ================================================================== [ 290.414863][T18342] dump_stack_lvl+0xd6/0x122 05:15:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000000}, 0x80) 05:15:15 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 24) [ 290.414941][T18336] BUG: KCSAN: data-race in data_push_tail / number [ 290.414956][T18342] dump_stack+0x11/0x1b [ 290.414974][T18336] [ 290.414980][T18336] write to 0xffffffff86dce108 of 1 bytes by task 18342 on cpu 1: [ 290.414983][T18342] should_fail+0x23c/0x250 [ 290.414999][T18336] number+0x955/0xb60 [ 290.415010][T18342] __alloc_pages+0x102/0x330 [ 290.415025][T18336] vsnprintf+0xb6d/0xed0 [ 290.415033][T18342] alloc_pages_vma+0x67e/0x810 [ 290.415051][T18336] vscnprintf+0x29/0x80 [ 290.415066][T18342] shmem_getpage_gfp+0x8b4/0x12c0 [ 290.415075][T18336] vprintk_store+0x638/0xbb0 [ 290.415093][T18336] vprintk_emit+0xac/0x3c0 [ 290.415110][T18336] vprintk_default+0x22/0x30 [ 290.415130][T18336] vprintk+0x7f/0x90 [ 290.415130][T18342] shmem_write_begin+0x7e/0x100 [ 290.415149][T18336] _printk+0x76/0x97 [ 290.415156][T18342] generic_perform_write+0x1c8/0x400 [ 290.415172][T18336] dump_stack_print_info+0xba/0x130 [ 290.415199][T18336] dump_stack_lvl+0xca/0x122 [ 290.415224][T18336] dump_stack+0x11/0x1b [ 290.415230][T18342] ? current_time+0xed/0x1a0 [ 290.415250][T18336] should_fail+0x23c/0x250 [ 290.415273][T18336] __alloc_pages+0x102/0x330 [ 290.415290][T18336] alloc_pages_vma+0x67e/0x810 [ 290.415310][T18336] shmem_getpage_gfp+0x8b4/0x12c0 [ 290.415332][T18342] __generic_file_write_iter+0xf7/0x2b0 [ 290.415334][T18336] shmem_write_begin+0x7e/0x100 [ 290.415354][T18342] ? generic_write_checks+0x250/0x290 [ 290.415359][T18336] generic_perform_write+0x1c8/0x400 [ 290.415379][T18336] __generic_file_write_iter+0xf7/0x2b0 [ 290.415398][T18336] generic_file_write_iter+0x75/0x130 [ 290.415417][T18336] vfs_write+0x7f5/0x950 [ 290.415434][T18336] __x64_sys_pwrite64+0xf5/0x150 [ 290.415443][T18342] generic_file_write_iter+0x75/0x130 [ 290.415456][T18336] do_syscall_64+0x44/0xd0 [ 290.415478][T18336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.415503][T18336] [ 290.415503][T18342] vfs_write+0x7f5/0x950 [ 290.415509][T18336] read to 0xffffffff86dce108 of 8 bytes by task 18336 on cpu 0: [ 290.415526][T18342] __x64_sys_pwrite64+0xf5/0x150 [ 290.415527][T18336] data_push_tail+0x138/0x470 [ 290.415548][T18336] data_alloc+0xbc/0x2b0 [ 290.415549][T18342] do_syscall_64+0x44/0xd0 [ 290.415568][T18336] prb_reserve+0x920/0xbf0 [ 290.415573][T18342] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.415589][T18336] vprintk_store+0x560/0xbb0 [ 290.415607][T18336] vprintk_emit+0xac/0x3c0 [ 290.415623][T18336] vprintk_default+0x22/0x30 [ 290.415641][T18336] vprintk+0x7f/0x90 [ 290.415644][T18342] RIP: 0033:0x7f89d6e35027 [ 290.415659][T18336] _printk+0x76/0x97 05:15:15 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x3000000}, 0x80) 05:15:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:15 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4000000}, 0x80) [ 290.415661][T18342] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 290.415676][T18336] fat_msg+0x91/0xb9 [ 290.415687][T18342] RSP: 002b:00007f89d5ff7f00 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 290.415702][T18336] fat_get_entry+0x567/0x620 [ 290.415711][T18342] RAX: ffffffffffffffda RBX: 00007f89d6ecb9c8 RCX: 00007f89d6e35027 [ 290.415727][T18342] RDX: 0000000000000009 RSI: 0000000020010500 RDI: 0000000000000004 [ 290.415724][T18336] fat_subdirs+0x56/0x1c0 [ 290.415748][T18336] fat_fill_super+0x25c2/0x2af0 [ 290.415771][T18336] vfat_fill_super+0x2c/0x40 [ 290.415788][T18336] mount_bdev+0x1e8/0x290 [ 290.415810][T18336] vfat_mount+0x2d/0x40 [ 290.415743][T18342] RBP: 0000000000000002 R08: 0000000000000000 R09: 00007f89d5ff81d0 [ 290.415826][T18336] legacy_get_tree+0x70/0xc0 [ 290.415847][T18336] vfs_get_tree+0x4a/0x1a0 [ 290.415869][T18336] path_mount+0x11cf/0x1c40 [ 290.415876][T18342] R10: 0000000000004000 R11: 0000000000000293 R12: 0000000000000004 [ 290.415891][T18342] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 290.415890][T18336] __se_sys_mount+0x24b/0x2f0 [ 290.415911][T18336] __x64_sys_mount+0x63/0x70 [ 290.415930][T18336] do_syscall_64+0x44/0xd0 [ 290.415948][T18336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.415960][T18342] [ 290.415973][T18336] [ 290.415977][T18336] value changed: 0x00000001000008e3 -> 0x203a6d6d6f432032 [ 290.415989][T18336] [ 290.415993][T18336] Reported by Kernel Concurrency Sanitizer on: [ 290.416000][T18336] CPU: 0 PID: 18336 Comm: syz-executor.5 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 290.416023][T18336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.416035][T18336] ================================================================== [ 290.435438][ T6261] I/O error, dev loop3, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 290.450375][ T6611] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 290.458238][ T6261] Buffer I/O error on dev loop3, logical block 3, async page read [ 290.476313][ T6261] Buffer I/O error on dev loop3, logical block 4, async page read [ 290.490886][T18342] loop4: detected capacity change from 0 to 64 [ 290.501860][T18350] loop1: detected capacity change from 0 to 64 [ 290.506175][ T8029] Buffer I/O error on dev loop4, logical block 3, async page read [ 290.518250][ T6261] Buffer I/O error on dev loop3, logical block 5, async page read [ 290.520485][ T8029] Buffer I/O error on dev loop4, logical block 4, async page read [ 290.534647][ T6261] Buffer I/O error on dev loop3, logical block 6, async page read [ 290.546703][ T6611] Buffer I/O error on dev loop1, logical block 0, async page read [ 290.562339][ T6261] Buffer I/O error on dev loop3, logical block 7, async page read [ 290.565540][T18354] FAULT_INJECTION: forcing a failure. [ 290.565540][T18354] name failslab, interval 1, probability 0, space 0, times 0 [ 290.574984][T18336] FAT-fs (loop5): Directory bread(block 1989) failed [ 290.579005][T18354] CPU: 0 PID: 18354 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 290.579031][T18354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.579085][T18354] Call Trace: [ 290.579091][T18354] [ 290.579097][T18354] dump_stack_lvl+0xd6/0x122 [ 290.584367][T18336] FAT-fs (loop5): Directory bread(block 1990) failed [ 290.589690][T18354] dump_stack+0x11/0x1b [ 290.589752][T18354] should_fail+0x23c/0x250 [ 290.589776][T18354] ? kzalloc+0x1d/0x30 [ 290.589794][T18354] __should_failslab+0x81/0x90 [ 290.589822][T18354] should_failslab+0x5/0x20 [ 290.589881][T18354] __kmalloc+0x6f/0x370 [ 290.589905][T18354] kzalloc+0x1d/0x30 [ 290.596461][T18336] FAT-fs (loop5): Directory bread(block 1991) failed [ 290.600093][T18354] kobject_get_path+0x7c/0x110 [ 290.600116][T18354] kobject_uevent_env+0x1ee/0xcc0 [ 290.600141][T18354] ? alloc_workqueue+0xa18/0xad0 [ 290.600171][T18354] ? preempt_count_add+0x4e/0x90 [ 290.600277][T18354] ? _raw_spin_unlock+0x2e/0x50 [ 290.600313][T18354] ? bd_prepare_to_claim+0x1ac/0x200 [ 290.600414][T18354] disk_force_media_change+0xe3/0x170 [ 290.600438][T18354] loop_configure+0x76e/0xf50 [ 290.600464][T18354] lo_ioctl+0x633/0x1280 [ 290.600485][T18354] ? folio_mark_dirty+0x84/0xe0 [ 290.600535][T18354] ? unlock_page+0x37/0x50 [ 290.605986][T18336] FAT-fs (loop5): Directory bread(block 1992) failed [ 290.611376][T18354] ? __rcu_read_unlock+0x5c/0x290 [ 290.611433][T18354] ? blkdev_common_ioctl+0x438/0x1060 [ 290.611461][T18354] ? selinux_file_ioctl+0x522/0x590 [ 290.611512][T18354] ? do_vfs_ioctl+0x819/0x14a0 [ 290.611531][T18354] ? lo_release+0x1e0/0x1e0 [ 290.611554][T18354] blkdev_ioctl+0x20e/0x440 [ 290.611581][T18354] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 290.618756][T18336] FAT-fs (loop5): Directory bread(block 1993) failed [ 290.621145][T18354] __se_sys_ioctl+0xcb/0x140 [ 290.621172][T18354] __x64_sys_ioctl+0x3f/0x50 [ 290.621192][T18354] do_syscall_64+0x44/0xd0 [ 290.621217][T18354] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 290.621276][T18354] RIP: 0033:0x7fd2e4e79e17 [ 290.621292][T18354] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 290.626334][T18336] FAT-fs (loop5): Directory bread(block 1994) failed [ 290.631566][T18354] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 290.631631][T18354] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 290.631645][T18354] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 290.631659][T18354] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 290.631672][T18354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 290.631686][T18354] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 290.631703][T18354] [ 290.632313][T18342] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 290.639433][T18336] FAT-fs (loop5): Directory bread(block 1995) failed [ 290.643004][T18354] loop3: detected capacity change from 0 to 64 [ 290.645975][T18350] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 290.648888][T18342] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 1) [ 290.687929][T18354] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 290.689883][T18342] FAT-fs (loop4): Filesystem has been set read-only [ 290.702431][T18354] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 290.707244][T18350] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 290.707400][T18354] FAT-fs (loop3): Filesystem has been set read-only [ 290.711221][T18350] FAT-fs (loop1): Filesystem has been set read-only 05:15:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x40, 0x0) 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x5000000}, 0x80) 05:15:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 25) 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 291.414181][ T6282] blk_print_req_error: 7 callbacks suppressed [ 291.414196][ T6282] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 291.429609][T18369] FAULT_INJECTION: forcing a failure. [ 291.429609][T18369] name failslab, interval 1, probability 0, space 0, times 0 [ 291.442484][T18369] CPU: 0 PID: 18369 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 291.453081][T18369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800800000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 291.463226][T18369] Call Trace: [ 291.466508][T18369] [ 291.469436][T18369] dump_stack_lvl+0xd6/0x122 [ 291.474051][T18369] dump_stack+0x11/0x1b [ 291.478292][T18369] should_fail+0x23c/0x250 [ 291.482716][T18369] __should_failslab+0x81/0x90 [ 291.487494][T18369] should_failslab+0x5/0x20 [ 291.492083][T18369] kmem_cache_alloc_node+0x61/0x2d0 [ 291.497732][T18369] ? __alloc_skb+0xf0/0x450 [ 291.502293][T18369] __alloc_skb+0xf0/0x450 [ 291.506628][T18369] alloc_uevent_skb+0x5b/0x120 [ 291.511454][T18369] kobject_uevent_env+0x8cd/0xcc0 [ 291.516492][T18369] ? preempt_count_add+0x4e/0x90 [ 291.521584][T18369] ? bd_prepare_to_claim+0x1ac/0x200 [ 291.526935][T18369] disk_force_media_change+0xe3/0x170 [ 291.532432][T18369] loop_configure+0x76e/0xf50 [ 291.537125][T18369] lo_ioctl+0x633/0x1280 [ 291.541456][T18369] ? folio_mark_dirty+0x84/0xe0 [ 291.546411][T18369] ? unlock_page+0x37/0x50 [ 291.550836][T18369] ? __rcu_read_unlock+0x5c/0x290 [ 291.555926][T18369] ? blkdev_common_ioctl+0x438/0x1060 [ 291.561319][T18369] ? selinux_file_ioctl+0x522/0x590 [ 291.566593][T18369] ? do_vfs_ioctl+0x819/0x14a0 [ 291.571342][T18369] ? lo_release+0x1e0/0x1e0 [ 291.575896][T18369] blkdev_ioctl+0x20e/0x440 [ 291.580390][T18369] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 291.585931][T18369] __se_sys_ioctl+0xcb/0x140 [ 291.590577][T18369] __x64_sys_ioctl+0x3f/0x50 [ 291.595317][T18369] do_syscall_64+0x44/0xd0 [ 291.599925][T18369] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 291.606069][T18369] RIP: 0033:0x7fd2e4e79e17 [ 291.610504][T18369] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 291.630380][T18369] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 291.638840][T18369] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 291.646803][T18369] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 291.654796][T18369] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6000000}, 0x80) 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 291.662829][T18369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 291.670943][T18369] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 291.678933][T18369] [ 291.683747][T18369] loop3: detected capacity change from 0 to 64 [ 291.685324][T18372] loop4: detected capacity change from 0 to 64 [ 291.696913][T18367] loop5: detected capacity change from 0 to 64 [ 291.703733][T18388] loop1: detected capacity change from 0 to 64 [ 291.710441][T18369] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 291.723253][T18369] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 291.731152][T18369] FAT-fs (loop3): Filesystem has been set read-only [ 291.737944][T18388] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 291.740916][T18372] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 291.756586][T18372] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 291.756873][T18388] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 291.764465][T18372] FAT-fs (loop4): Filesystem has been set read-only [ 291.766406][T18367] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 291.772386][T18388] FAT-fs (loop1): Filesystem has been set read-only 05:15:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, 0x0, 0x40, 0x0) 05:15:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x7000000}, 0x80) 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 291.824890][T18367] FAT-fs (loop5): Directory bread(block 1986) failed [ 291.832225][T18367] FAT-fs (loop5): Directory bread(block 1987) failed [ 291.848341][T18367] FAT-fs (loop5): Directory bread(block 1988) failed [ 291.855561][T18367] FAT-fs (loop5): Directory bread(block 1989) failed [ 291.862887][T18367] FAT-fs (loop5): Directory bread(block 1990) failed [ 291.865248][T18395] loop1: detected capacity change from 0 to 64 [ 291.869859][T18367] FAT-fs (loop5): Directory bread(block 1991) failed [ 291.883465][T18367] FAT-fs (loop5): Directory bread(block 1992) failed [ 291.887354][T18395] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 291.890411][T18367] FAT-fs (loop5): Directory bread(block 1993) failed [ 291.901093][T18395] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 291.907096][T18367] FAT-fs (loop5): Directory bread(block 1994) failed 05:15:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:16 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 26) 05:15:16 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x8000000}, 0x80) 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) [ 291.914406][T18395] FAT-fs (loop1): Filesystem has been set read-only [ 291.928387][T18367] FAT-fs (loop5): Directory bread(block 1995) failed [ 291.964592][T18401] FAULT_INJECTION: forcing a failure. 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x80000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x9000000}, 0x80) 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 291.964592][T18401] name failslab, interval 1, probability 0, space 0, times 0 [ 291.977397][T18401] CPU: 1 PID: 18401 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 291.988452][T18401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.998948][T18401] Call Trace: [ 292.002221][T18401] [ 292.005167][T18401] dump_stack_lvl+0xd6/0x122 [ 292.009782][T18401] dump_stack+0x11/0x1b [ 292.014209][T18401] should_fail+0x23c/0x250 [ 292.018739][T18401] __should_failslab+0x81/0x90 05:15:16 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xa000000}, 0x80) 05:15:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb000000}, 0x80) [ 292.023510][T18401] should_failslab+0x5/0x20 [ 292.028084][T18401] kmem_cache_alloc_node_trace+0x61/0x310 [ 292.033809][T18401] ? __kmalloc_node_track_caller+0x30/0x40 [ 292.039643][T18401] __kmalloc_node_track_caller+0x30/0x40 [ 292.045368][T18401] ? alloc_uevent_skb+0x5b/0x120 [ 292.050316][T18401] __alloc_skb+0x19d/0x450 [ 292.054756][T18401] alloc_uevent_skb+0x5b/0x120 [ 292.059621][T18401] kobject_uevent_env+0x8cd/0xcc0 [ 292.064647][T18401] ? preempt_count_add+0x4e/0x90 [ 292.069851][T18401] ? bd_prepare_to_claim+0x1ac/0x200 [ 292.075261][T18401] disk_force_media_change+0xe3/0x170 [ 292.080730][T18401] loop_configure+0x76e/0xf50 [ 292.085541][T18401] lo_ioctl+0x633/0x1280 [ 292.089805][T18401] ? folio_mark_dirty+0x84/0xe0 [ 292.094754][T18401] ? unlock_page+0x37/0x50 [ 292.099248][T18401] ? __rcu_read_unlock+0x5c/0x290 [ 292.104326][T18401] ? blkdev_common_ioctl+0x438/0x1060 [ 292.109705][T18401] ? selinux_file_ioctl+0x522/0x590 [ 292.115025][T18401] ? do_vfs_ioctl+0x819/0x14a0 [ 292.119951][T18401] ? lo_release+0x1e0/0x1e0 [ 292.124491][T18401] blkdev_ioctl+0x20e/0x440 [ 292.129433][T18401] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 292.135046][T18401] __se_sys_ioctl+0xcb/0x140 [ 292.139707][T18401] __x64_sys_ioctl+0x3f/0x50 [ 292.144326][T18401] do_syscall_64+0x44/0xd0 [ 292.149035][T18401] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.154924][T18401] RIP: 0033:0x7fd2e4e79e17 [ 292.159656][T18401] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 292.179653][T18401] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.188084][T18401] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 292.196118][T18401] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 292.204302][T18401] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 292.212257][T18401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 292.220308][T18401] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 292.228396][T18401] [ 292.234611][T18401] loop3: detected capacity change from 0 to 64 [ 292.241030][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 292.242802][T18401] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 292.252858][T18404] loop1: detected capacity change from 0 to 64 [ 292.266136][T18405] loop4: detected capacity change from 0 to 64 05:15:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 292.274230][T18405] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 292.283608][T18401] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 292.284689][T18404] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 292.291483][T18401] FAT-fs (loop3): Filesystem has been set read-only [ 292.304945][T18405] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 292.314960][T18405] FAT-fs (loop4): Filesystem has been set read-only 05:15:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 27) 05:15:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xc000000}, 0x80) 05:15:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x204000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 292.321669][T18404] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 292.329534][T18404] FAT-fs (loop1): Filesystem has been set read-only [ 292.337309][ T8029] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 292.372616][T18430] FAULT_INJECTION: forcing a failure. [ 292.372616][T18430] name failslab, interval 1, probability 0, space 0, times 0 [ 292.385314][T18430] CPU: 1 PID: 18430 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 292.395814][T18430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.405866][T18430] Call Trace: [ 292.409208][T18430] [ 292.412120][T18430] dump_stack_lvl+0xd6/0x122 [ 292.416858][T18430] dump_stack+0x11/0x1b [ 292.421001][T18430] should_fail+0x23c/0x250 [ 292.425406][T18430] ? skb_clone+0x12c/0x1f0 [ 292.429846][T18430] __should_failslab+0x81/0x90 [ 292.434687][T18430] should_failslab+0x5/0x20 [ 292.439410][T18430] kmem_cache_alloc+0x4f/0x320 [ 292.444520][T18430] skb_clone+0x12c/0x1f0 [ 292.448758][T18430] netlink_broadcast+0x4e9/0xad0 [ 292.453760][T18430] kobject_uevent_env+0x933/0xcc0 [ 292.458779][T18430] ? preempt_count_add+0x4e/0x90 [ 292.463747][T18430] ? bd_prepare_to_claim+0x1ac/0x200 [ 292.469454][T18430] disk_force_media_change+0xe3/0x170 [ 292.474886][T18430] loop_configure+0x76e/0xf50 [ 292.479611][T18430] lo_ioctl+0x633/0x1280 [ 292.483881][T18430] ? folio_mark_dirty+0x84/0xe0 [ 292.488743][T18430] ? unlock_page+0x37/0x50 [ 292.493154][T18430] ? __rcu_read_unlock+0x5c/0x290 [ 292.498163][T18430] ? blkdev_common_ioctl+0x438/0x1060 [ 292.503572][T18430] ? selinux_file_ioctl+0x522/0x590 [ 292.508831][T18430] ? do_vfs_ioctl+0x819/0x14a0 [ 292.513592][T18430] ? lo_release+0x1e0/0x1e0 [ 292.518127][T18430] blkdev_ioctl+0x20e/0x440 [ 292.522811][T18430] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 292.528433][T18430] __se_sys_ioctl+0xcb/0x140 [ 292.533162][T18430] __x64_sys_ioctl+0x3f/0x50 [ 292.537749][T18430] do_syscall_64+0x44/0xd0 [ 292.542145][T18430] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 292.548461][T18430] RIP: 0033:0x7fd2e4e79e17 [ 292.553284][T18430] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 292.573017][T18430] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.581415][T18430] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 292.589568][T18430] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 292.597828][T18430] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 292.605885][T18430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 292.614081][T18430] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 05:15:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) 05:15:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xd000000}, 0x80) 05:15:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xe000000}, 0x80) [ 292.622063][T18430] [ 292.629717][T18429] loop5: detected capacity change from 0 to 64 [ 292.635885][T18430] loop3: detected capacity change from 0 to 64 [ 292.649973][T18434] loop4: detected capacity change from 0 to 64 [ 292.659755][T18429] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 292.665156][T18430] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 292.681329][T18440] loop1: detected capacity change from 0 to 64 [ 292.688349][T18440] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 292.703741][T18430] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 292.704526][T18434] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x10000000}, 0x80) 05:15:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x10020000}, 0x80) [ 292.711795][T18430] FAT-fs (loop3): Filesystem has been set read-only [ 292.732619][T18440] FAT-fs (loop1): error, invalid access to FAT (entry 0x000000f8) [ 292.738255][T18429] FAT-fs (loop5): Directory bread(block 1986) failed [ 292.740555][T18440] FAT-fs (loop1): Filesystem has been set read-only [ 292.743160][T18434] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 292.761849][T18434] FAT-fs (loop4): Filesystem has been set read-only 05:15:17 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 28) 05:15:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x11000000}, 0x80) [ 292.770341][T18429] FAT-fs (loop5): Directory bread(block 1987) failed [ 292.777550][T18429] FAT-fs (loop5): Directory bread(block 1988) failed [ 292.786603][T18429] FAT-fs (loop5): Directory bread(block 1989) failed [ 292.798501][T18429] FAT-fs (loop5): Directory bread(block 1990) failed [ 292.836014][T18454] FAULT_INJECTION: forcing a failure. [ 292.836014][T18454] name failslab, interval 1, probability 0, space 0, times 0 [ 292.845916][T18429] FAT-fs (loop5): Directory bread(block 1991) failed [ 292.848678][T18454] CPU: 0 PID: 18454 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 292.848705][T18454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.848718][T18454] Call Trace: [ 292.848724][T18454] [ 292.848731][T18454] dump_stack_lvl+0xd6/0x122 [ 292.848836][T18454] dump_stack+0x11/0x1b [ 292.856465][T18429] FAT-fs (loop5): Directory bread(block 1992) failed [ 292.866009][T18454] should_fail+0x23c/0x250 [ 292.866036][T18454] ? __kernfs_new_node+0x6a/0x340 [ 292.866104][T18454] __should_failslab+0x81/0x90 [ 292.866130][T18454] should_failslab+0x5/0x20 [ 292.866168][T18454] kmem_cache_alloc+0x4f/0x320 [ 292.866192][T18454] __kernfs_new_node+0x6a/0x340 [ 292.866269][T18454] ? ___cache_free+0x46/0x310 [ 292.866290][T18454] ? kmem_cache_free+0x65/0x110 [ 292.889497][T18429] FAT-fs (loop5): Directory bread(block 1993) failed [ 292.891511][T18454] kernfs_create_dir_ns+0x5e/0x140 [ 292.891539][T18454] internal_create_group+0x13e/0x840 [ 292.891565][T18454] sysfs_create_group+0x1b/0x20 [ 292.891595][T18454] loop_configure+0xc6e/0xf50 [ 292.891622][T18454] lo_ioctl+0x633/0x1280 [ 292.891644][T18454] ? folio_mark_dirty+0x84/0xe0 [ 292.902337][T18429] FAT-fs (loop5): Directory bread(block 1994) failed [ 292.902894][T18454] ? unlock_page+0x37/0x50 [ 292.902923][T18454] ? __rcu_read_unlock+0x5c/0x290 [ 292.903000][T18454] ? blkdev_common_ioctl+0x438/0x1060 [ 292.908770][T18429] FAT-fs (loop5): Directory bread(block 1995) failed [ 292.912774][T18454] ? selinux_file_ioctl+0x522/0x590 [ 293.005681][T18454] ? do_vfs_ioctl+0x819/0x14a0 [ 293.010464][T18454] ? lo_release+0x1e0/0x1e0 [ 293.015015][T18454] blkdev_ioctl+0x20e/0x440 [ 293.019527][T18454] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 293.025027][T18454] __se_sys_ioctl+0xcb/0x140 [ 293.029638][T18454] __x64_sys_ioctl+0x3f/0x50 05:15:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(0x0, 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x12000000}, 0x80) 05:15:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:17 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:17 executing program 1: keyctl$chown(0x4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) add_key$keyring(&(0x7f00000008c0), &(0x7f0000000900)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) 05:15:17 executing program 1: syz_emit_ethernet(0x77, &(0x7f0000000180)={@local, @random="bcde7f30566f", @void, {@ipv4={0x800, @tcp={{0x7, 0x4, 0x0, 0x0, 0x69, 0x0, 0x0, 0x0, 0x6, 0x0, @private, @rand_addr, {[@ra={0x94, 0x4}, @end]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, {[@md5sig={0x13, 0x12, "97cdedb83864718ff1812115daa36b38"}]}}, {"d65b6035a834277aee3b50b6c23ba16ac6aea847f3a924fc65eb7b12d87099600c26e0337c"}}}}}}, 0x0) 05:15:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x604000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 293.034228][T18454] do_syscall_64+0x44/0xd0 [ 293.038649][T18454] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 293.044557][T18454] RIP: 0033:0x7fd2e4e79e17 [ 293.048981][T18454] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 293.069383][T18454] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.077843][T18454] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 05:15:17 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSBRK(r0, 0x5409, 0x9) [ 293.085904][T18454] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 293.093964][T18454] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 293.102182][T18454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 293.110160][T18454] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 293.118365][T18454] [ 293.121616][T18454] loop3: detected capacity change from 0 to 64 05:15:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x18000000}, 0x80) [ 293.131120][T18467] loop4: detected capacity change from 0 to 64 [ 293.131997][T18467] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 293.132180][T18467] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 293.132198][T18467] FAT-fs (loop4): Filesystem has been set read-only [ 293.139103][T18454] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 29) 05:15:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000180)="f289487e8ea68e5377252ee311f22d77", 0x10) 05:15:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20000000}, 0x80) 05:15:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(0x0, 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) [ 293.198855][T18454] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 293.206697][T18454] FAT-fs (loop3): Filesystem has been set read-only 05:15:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000440)=""/148, 0x2e, 0x94, 0x1}, 0x20) [ 293.261403][T18481] loop4: detected capacity change from 0 to 64 [ 293.262922][T18480] loop5: detected capacity change from 0 to 64 [ 293.282230][T18484] FAULT_INJECTION: forcing a failure. [ 293.282230][T18484] name failslab, interval 1, probability 0, space 0, times 0 [ 293.295312][T18484] CPU: 1 PID: 18484 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 293.305817][T18484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.307486][T18480] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 293.315873][T18484] Call Trace: [ 293.315883][T18484] [ 293.315891][T18484] dump_stack_lvl+0xd6/0x122 [ 293.335923][T18484] dump_stack+0x11/0x1b [ 293.340102][T18484] should_fail+0x23c/0x250 [ 293.344582][T18484] ? __kernfs_new_node+0x6a/0x340 [ 293.349706][T18484] __should_failslab+0x81/0x90 [ 293.354650][T18484] should_failslab+0x5/0x20 [ 293.359185][T18484] kmem_cache_alloc+0x4f/0x320 [ 293.360781][T18480] FAT-fs (loop5): Directory bread(block 1986) failed [ 293.363951][T18484] __kernfs_new_node+0x6a/0x340 [ 293.363978][T18484] ? idr_alloc_cyclic+0x26b/0x2f0 [ 293.364000][T18484] ? __down_write_common+0x42/0x7b0 [ 293.364023][T18484] ? rb_insert_color+0x7e/0x310 [ 293.364045][T18484] ? security_kernfs_init_security+0x7b/0x90 [ 293.384360][T18480] FAT-fs (loop5): Directory bread(block 1987) failed [ 293.386003][T18484] kernfs_new_node+0x5b/0xd0 [ 293.386028][T18484] __kernfs_create_file+0x45/0x1a0 [ 293.398707][T18480] FAT-fs (loop5): Directory bread(block 1988) failed [ 293.403532][T18484] ? dev_attr_show+0x90/0x90 [ 293.420176][T18480] FAT-fs (loop5): Directory bread(block 1989) failed [ 293.424483][T18484] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 293.424525][T18484] internal_create_group+0x2dd/0x840 [ 293.424553][T18484] sysfs_create_group+0x1b/0x20 [ 293.424576][T18484] loop_configure+0xc6e/0xf50 [ 293.424602][T18484] lo_ioctl+0x633/0x1280 [ 293.444586][T18480] FAT-fs (loop5): Directory bread(block 1990) failed [ 293.447027][T18484] ? folio_mark_dirty+0x84/0xe0 [ 293.447057][T18484] ? unlock_page+0x37/0x50 [ 293.447080][T18484] ? __rcu_read_unlock+0x5c/0x290 [ 293.460811][T18480] FAT-fs (loop5): Directory bread(block 1991) failed [ 293.463765][T18484] ? blkdev_common_ioctl+0x438/0x1060 [ 293.463796][T18484] ? selinux_file_ioctl+0x522/0x590 [ 293.463824][T18484] ? do_vfs_ioctl+0x819/0x14a0 [ 293.463842][T18484] ? lo_release+0x1e0/0x1e0 [ 293.478841][T18480] FAT-fs (loop5): Directory bread(block 1992) failed [ 293.484938][T18484] blkdev_ioctl+0x20e/0x440 [ 293.484974][T18484] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 293.485001][T18484] __se_sys_ioctl+0xcb/0x140 [ 293.504544][T18480] FAT-fs (loop5): Directory bread(block 1993) failed [ 293.507047][T18484] __x64_sys_ioctl+0x3f/0x50 [ 293.507117][T18484] do_syscall_64+0x44/0xd0 [ 293.507142][T18484] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 293.527214][T18480] FAT-fs (loop5): Directory bread(block 1994) failed [ 293.529592][T18484] RIP: 0033:0x7fd2e4e79e17 [ 293.529609][T18484] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 293.529630][T18484] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 293.529651][T18484] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 293.536499][T18480] FAT-fs (loop5): Directory bread(block 1995) failed [ 293.540909][T18484] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 05:15:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x25000000}, 0x80) 05:15:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(0x0, 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x40000000}, 0x80) [ 293.540924][T18484] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 293.540937][T18484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 293.540950][T18484] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 293.637100][T18484] [ 293.647517][T18484] loop3: detected capacity change from 0 to 64 05:15:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x48000000}, 0x80) 05:15:18 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000500)={0x0, &(0x7f0000000440)=""/148, 0x0, 0x94}, 0x20) [ 293.666926][T18481] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 293.695093][T18481] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 293.703123][T18481] FAT-fs (loop4): Filesystem has been set read-only 05:15:18 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 30) 05:15:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:18 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x4c000000}, 0x80) 05:15:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x30, 0x0, 0x0) 05:15:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) [ 293.712415][T18484] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 293.728181][T18484] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 293.736160][T18484] FAT-fs (loop3): Filesystem has been set read-only 05:15:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x68000000}, 0x80) 05:15:18 executing program 1: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@multicast, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "ecadfb", 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1}}}}, 0x0) [ 293.793506][T18503] loop5: detected capacity change from 0 to 64 [ 293.802984][T18508] loop4: detected capacity change from 0 to 64 [ 293.830200][T18508] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:18 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6c000000}, 0x80) [ 293.831281][T18503] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 293.859838][T18516] FAULT_INJECTION: forcing a failure. [ 293.859838][T18516] name failslab, interval 1, probability 0, space 0, times 0 [ 293.872607][T18516] CPU: 1 PID: 18516 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 293.883168][T18516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.893236][T18516] Call Trace: [ 293.896536][T18516] [ 293.899472][T18516] dump_stack_lvl+0xd6/0x122 [ 293.904112][T18516] dump_stack+0x11/0x1b [ 293.908290][T18516] should_fail+0x23c/0x250 [ 293.916151][T18516] ? __kernfs_new_node+0x6a/0x340 [ 293.929621][T18516] __should_failslab+0x81/0x90 [ 293.934629][T18516] should_failslab+0x5/0x20 [ 293.939412][T18516] kmem_cache_alloc+0x4f/0x320 [ 293.944371][T18516] __kernfs_new_node+0x6a/0x340 [ 293.949415][T18516] ? rb_insert_color+0x2fa/0x310 [ 293.954486][T18516] ? up_write+0x25/0xc0 [ 293.958908][T18516] ? kernfs_activate+0x308/0x320 [ 293.963996][T18516] kernfs_new_node+0x5b/0xd0 [ 293.969133][T18516] __kernfs_create_file+0x45/0x1a0 [ 293.974454][T18516] ? dev_attr_show+0x90/0x90 [ 293.979068][T18516] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 293.984500][T18516] internal_create_group+0x2dd/0x840 [ 293.989925][T18516] sysfs_create_group+0x1b/0x20 [ 293.994821][T18516] loop_configure+0xc6e/0xf50 [ 293.999510][T18516] lo_ioctl+0x633/0x1280 [ 294.003765][T18516] ? folio_mark_dirty+0x84/0xe0 [ 294.008835][T18516] ? unlock_page+0x37/0x50 [ 294.013344][T18516] ? __rcu_read_unlock+0x5c/0x290 [ 294.018389][T18516] ? blkdev_common_ioctl+0x438/0x1060 [ 294.023803][T18516] ? selinux_file_ioctl+0x522/0x590 [ 294.029015][T18516] ? do_vfs_ioctl+0x819/0x14a0 [ 294.033779][T18516] ? lo_release+0x1e0/0x1e0 [ 294.038285][T18516] blkdev_ioctl+0x20e/0x440 [ 294.042888][T18516] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 294.048386][T18516] __se_sys_ioctl+0xcb/0x140 [ 294.052989][T18516] __x64_sys_ioctl+0x3f/0x50 [ 294.057746][T18516] do_syscall_64+0x44/0xd0 [ 294.062217][T18516] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 294.068180][T18516] RIP: 0033:0x7fd2e4e79e17 [ 294.072605][T18516] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 05:15:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000500)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000440)=""/148, 0x1a, 0x94, 0x1}, 0x20) 05:15:18 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x4}, 0x48) [ 294.092213][T18516] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.100719][T18516] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 294.108784][T18516] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 294.116922][T18516] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 294.125041][T18516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 294.133014][T18516] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 294.140985][T18516] [ 294.148019][T18516] loop3: detected capacity change from 0 to 64 [ 294.154380][T18508] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 294.162832][T18508] FAT-fs (loop4): Filesystem has been set read-only [ 294.192702][T18516] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 294.208592][T18503] FAT-fs (loop5): Directory bread(block 1986) failed [ 294.215781][T18516] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 294.223657][T18516] FAT-fs (loop3): Filesystem has been set read-only [ 294.227352][T18503] FAT-fs (loop5): Directory bread(block 1987) failed [ 294.237436][T18503] FAT-fs (loop5): Directory bread(block 1988) failed [ 294.244501][T18503] FAT-fs (loop5): Directory bread(block 1989) failed [ 294.251820][T18503] FAT-fs (loop5): Directory bread(block 1990) failed [ 294.259551][T18503] FAT-fs (loop5): Directory bread(block 1991) failed [ 294.266614][T18503] FAT-fs (loop5): Directory bread(block 1992) failed [ 294.274142][T18503] FAT-fs (loop5): Directory bread(block 1993) failed 05:15:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 31) 05:15:19 executing program 1: bpf$BPF_BTF_LOAD(0x21, 0x0, 0x0) [ 294.289153][T18503] FAT-fs (loop5): Directory bread(block 1994) failed [ 294.296299][T18503] FAT-fs (loop5): Directory bread(block 1995) failed [ 294.321897][T18527] FAULT_INJECTION: forcing a failure. [ 294.321897][T18527] name failslab, interval 1, probability 0, space 0, times 0 [ 294.334791][T18527] CPU: 1 PID: 18527 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 294.345292][T18527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.355383][T18527] Call Trace: [ 294.358657][T18527] [ 294.361583][T18527] dump_stack_lvl+0xd6/0x122 [ 294.366309][T18527] dump_stack+0x11/0x1b [ 294.370472][T18527] should_fail+0x23c/0x250 [ 294.374887][T18527] ? __kernfs_new_node+0x6a/0x340 [ 294.379918][T18527] __should_failslab+0x81/0x90 [ 294.384776][T18527] should_failslab+0x5/0x20 [ 294.389283][T18527] kmem_cache_alloc+0x4f/0x320 [ 294.394093][T18527] __kernfs_new_node+0x6a/0x340 [ 294.398952][T18527] ? rb_insert_color+0x7e/0x310 [ 294.403994][T18527] ? up_write+0x25/0xc0 [ 294.408184][T18527] ? kernfs_activate+0x308/0x320 [ 294.413222][T18527] kernfs_new_node+0x5b/0xd0 [ 294.418580][T18527] __kernfs_create_file+0x45/0x1a0 [ 294.423840][T18527] ? dev_attr_show+0x90/0x90 [ 294.428459][T18527] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 294.433884][T18527] internal_create_group+0x2dd/0x840 [ 294.439405][T18527] sysfs_create_group+0x1b/0x20 [ 294.444412][T18527] loop_configure+0xc6e/0xf50 [ 294.449404][T18527] lo_ioctl+0x633/0x1280 [ 294.453916][T18527] ? folio_mark_dirty+0x84/0xe0 [ 294.458860][T18527] ? unlock_page+0x37/0x50 [ 294.463549][T18527] ? __rcu_read_unlock+0x5c/0x290 [ 294.468660][T18527] ? blkdev_common_ioctl+0x438/0x1060 [ 294.474228][T18527] ? selinux_file_ioctl+0x522/0x590 [ 294.479520][T18527] ? do_vfs_ioctl+0x819/0x14a0 [ 294.484294][T18527] ? lo_release+0x1e0/0x1e0 [ 294.488857][T18527] blkdev_ioctl+0x20e/0x440 [ 294.493942][T18527] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 294.499843][T18527] __se_sys_ioctl+0xcb/0x140 [ 294.505431][T18527] __x64_sys_ioctl+0x3f/0x50 [ 294.510031][T18527] do_syscall_64+0x44/0xd0 [ 294.514714][T18527] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 294.520724][T18527] RIP: 0033:0x7fd2e4e79e17 [ 294.525129][T18527] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 294.544764][T18527] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.553535][T18527] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 294.561598][T18527] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 294.569653][T18527] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 294.578398][T18527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 294.586416][T18527] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 05:15:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x74000000}, 0x80) 05:15:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x2, 0x4}]}}, &(0x7f0000000200)=""/252, 0x26, 0xfc, 0x1}, 0x20) [ 294.594653][T18527] [ 294.605135][T18527] loop3: detected capacity change from 0 to 64 [ 294.618551][T18527] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 294.636265][T18535] loop4: detected capacity change from 0 to 64 05:15:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x7a000000}, 0x80) 05:15:19 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000500000000f000000000000000200000006000000000008000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000008000000018000000c20500002b82", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000039c043f6970341999833e8e90d2470c4010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x1000}, {0x0, 0x0, 0x80000}], 0x0, &(0x7f0000013b00)) 05:15:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) [ 294.643871][T18527] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 294.652249][T18527] FAT-fs (loop3): Filesystem has been set read-only [ 294.666088][T18535] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 05:15:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x85ffffff}, 0x80) 05:15:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000080000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 32) [ 294.698813][T18537] loop1: detected capacity change from 0 to 2048 [ 294.709440][T18535] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000f8) [ 294.711573][T18541] loop5: detected capacity change from 0 to 64 [ 294.717533][T18535] FAT-fs (loop4): Filesystem has been set read-only [ 294.742484][T18537] EXT4-fs warning (device loop1): read_mmp_block:107: Error -117 while reading MMP block 64 [ 294.760057][T18549] FAULT_INJECTION: forcing a failure. [ 294.760057][T18549] name failslab, interval 1, probability 0, space 0, times 0 [ 294.773101][T18549] CPU: 0 PID: 18549 Comm: syz-executor.3 Not tainted 5.17.0-rc2-syzkaller-00039-g9f7fb8de5d9b #0 [ 294.783820][T18549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.794614][T18549] Call Trace: [ 294.797887][T18549] [ 294.800810][T18549] dump_stack_lvl+0xd6/0x122 [ 294.805464][T18549] dump_stack+0x11/0x1b [ 294.809993][T18549] should_fail+0x23c/0x250 [ 294.811470][T18541] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 294.814472][T18549] ? __kernfs_new_node+0x6a/0x340 [ 294.814495][T18549] __should_failslab+0x81/0x90 [ 294.814520][T18549] should_failslab+0x5/0x20 [ 294.814547][T18549] kmem_cache_alloc+0x4f/0x320 [ 294.842703][T18549] __kernfs_new_node+0x6a/0x340 [ 294.847616][T18549] ? rb_insert_color+0x2cb/0x310 [ 294.852700][T18549] ? up_write+0x25/0xc0 [ 294.856858][T18549] ? kernfs_activate+0x308/0x320 [ 294.861834][T18549] kernfs_new_node+0x5b/0xd0 [ 294.866433][T18549] __kernfs_create_file+0x45/0x1a0 [ 294.869069][T18541] FAT-fs (loop5): Directory bread(block 1986) failed [ 294.871585][T18549] ? dev_attr_show+0x90/0x90 [ 294.871608][T18549] sysfs_add_file_mode_ns+0x10b/0x1d0 [ 294.871633][T18549] internal_create_group+0x2dd/0x840 [ 294.871678][T18549] sysfs_create_group+0x1b/0x20 05:15:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xb0000000}, 0x80) [ 294.871701][T18549] loop_configure+0xc6e/0xf50 [ 294.891750][T18541] FAT-fs (loop5): Directory bread(block 1987) failed [ 294.893571][T18549] lo_ioctl+0x633/0x1280 [ 294.893598][T18549] ? __schedule+0x43a/0x690 [ 294.893618][T18549] ? __rcu_read_unlock+0x5c/0x290 [ 294.893646][T18549] ? blkdev_common_ioctl+0x438/0x1060 [ 294.893695][T18549] ? selinux_file_ioctl+0x522/0x590 [ 294.893720][T18549] ? do_vfs_ioctl+0x819/0x14a0 [ 294.893737][T18549] ? lo_release+0x1e0/0x1e0 [ 294.893757][T18549] blkdev_ioctl+0x20e/0x440 [ 294.908125][T18541] FAT-fs (loop5): Directory bread(block 1988) failed [ 294.909934][T18549] ? blkdev_compat_ptr_ioctl+0x80/0x80 [ 294.909983][T18549] __se_sys_ioctl+0xcb/0x140 [ 294.910001][T18549] __x64_sys_ioctl+0x3f/0x50 [ 294.910019][T18549] do_syscall_64+0x44/0xd0 [ 294.910044][T18549] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 294.916647][T18541] FAT-fs (loop5): Directory bread(block 1989) failed [ 294.918784][T18549] RIP: 0033:0x7fd2e4e79e17 [ 294.918801][T18549] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 04 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 294.918849][T18549] RSP: 002b:00007fd2e3feff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 294.918875][T18549] RAX: ffffffffffffffda RBX: 00007fd2e4ec39c8 RCX: 00007fd2e4e79e17 [ 294.918889][T18549] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 294.918902][T18549] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007fd2e3ff01d0 [ 294.918915][T18549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 294.918929][T18549] R13: 0000000000000004 R14: 0000000020000230 R15: 0000000000000002 [ 294.918946][T18549] [ 294.924264][T18549] loop3: detected capacity change from 0 to 64 [ 294.954201][T18541] FAT-fs (loop5): Directory bread(block 1990) failed [ 295.031727][T18549] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 295.044854][T18541] FAT-fs (loop5): Directory bread(block 1991) failed 05:15:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ptrace$cont(0x1f, 0x0, 0x3, 0x4) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x87) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYBLOB]) sendmsg$IPSET_CMD_DEL(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000e0}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c144}, 0x20008000) 05:15:19 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x6, &(0x7f0000000140)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @alu={0x4, 0x0, 0xb, 0x0, 0x8}, @exit]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0xee, &(0x7f0000000000)=""/156, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xc6020000}, 0x80) 05:15:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ptrace(0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000440)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) r0 = memfd_create(&(0x7f0000000380)='#\'%noY%v\x00\x7f\xe5\xd0ql\xe2m]\'\xe5+\xe8\xe1g\x9d\x8ef\x069\x9b\x93\xb0\x7f_,y<~\xab\x84\x00\x00\x00\x00\x00\x14\x14}\n\x81\xc7\x85|oC\xca\v\x00\xba]fn\r\xdf!\x94\x0f\xaf\xb7\x93\xe8\xb6\xc3N\x16&\xf9{\xaf;\xcf\x8c\xa8\xb9\x06\xaf\xd0\xfb:\x90LNF;\x02\x00\x00/1\xb9V\xf0*\xcb\xdc\x05n<\xcf$\xbb\bLY\xdf \x98q\xb2v\\\xa9\xcf*tM\a\xc43\xd0d\xee\x13Q\xd7\xf4\xef\xac\xa7\x01\xb4\x8c\xc1\x8c\x04,\xe0r\x01\xff\xff\xd9V!>.\x8b\xcf5\x0f\x96\xe6`\xa5.j\xe3D)0\x86\xe1\x81FX\xb9\xaa\xe4\xd2\xaf\xf61\xf9_-\xa3\xb2dM\xee\v ', 0x0) sendfile(0xffffffffffffffff, r0, &(0x7f0000000200), 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYBLOB], 0x3c}}, 0x0) 05:15:19 executing program 1: clock_settime(0x131ca5a955328264, 0x0) 05:15:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) 05:15:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e666174000280200002007a0004f8000060004000000007f900000000010000000000000002", 0x2d}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000440)) (fail_nth: 33) [ 295.063704][T18549] FAT-fs (loop3): error, invalid access to FAT (entry 0x000000f8) [ 295.097236][T18541] FAT-fs (loop5): Directory bread(block 1992) failed [ 295.101871][T18549] FAT-fs (loop3): Filesystem has been set read-only [ 295.115767][T18541] FAT-fs (loop5): Directory bread(block 1993) failed [ 295.123540][T18541] FAT-fs (loop5): Directory bread(block 1994) failed [ 295.130640][T18541] FAT-fs (loop5): Directory bread(block 1995) failed [ 295.183800][T18561] loop4: detected capacity change from 0 to